Font Size: a A A

A Security Mechanism Of Mobile Agents Based On Intention

Posted on:2004-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:A N ZhangFull Text:PDF
GTID:2168360092996660Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the development of network technology, the traditional client/server(C/S) compute mode has already can't satisfy the complexity and the application's inflation of the Internet. A rising distributed compute mode: mobile agent (MA) has received extensive research and attention because of its intelligence, adaptability and mobility. Mobile agent is an independent program, which can migrate from one machine to another in a heterogeneous network, in order to look for appropriate compute resource, information resource or software resource and take advantage of these resources lying in the same host or network, to deal with and use these resources, delegate the user to finish the specific task. Mobile agent has obvious advantage in its application, it provide a new paradigm for distributed compute. However, mobile agent is the outcome combining the distributed compute technology with the artificial intelligence technology. Mobile agents have a lot of pivotal technology that need to be researched and to be explored. One of them is the security problem. We should measure these potential advantages and the security menaces have been exposed.This thesis analyzes the security problems of mobile agent, introduces the idea of the existed resolve-projects, discuss the character of the mobile agent's security and some measures to realize the security. The emphasis of this thesis is how to protect the mobile agents against tampering attempts by the malicious hosts or other agents.According to the current developing situation of the mobile agents' security problems, this thesis combines the concept of entropy in information theory and introduces a security mechanism of mobile agent based on intention in detail. This project conceal the original intention of the mobile agents by changing the entropy of the mobile agents, namely, by nested using the intention diffusing to increase entropy and intention decomposing to decrease entropy. And increase the difficulty of malicious hosts to guess the true intention of mobile agents. The malicious hosts are disturbed and not able to tamper the mobile agents, consequently, protect the mobile agents on the other hand. This thesis also analyzes the security of the project and proves it has favorable security. At the same time, this thesis discusses the mechanism farther: demonstrates its shortcoming and deficiency, and that, confirms the study direction. In the end, this thesis combines the mechanism with the anonymous mechanism to enhance the independence of the mobile agents, so increase the security of mobile agents.This thesis is divided into five chapters. The first chapter analyzes the character, application, advantage of mobile agents and points that security problem is one of the existed important problems. This thesis introduces the current developing situation and some existed technologies from three aspects of security problems and puts emphasis on the illumination of the problem that protecting the mobile agents and thesort of the security of mobile agents. The second chapter introduces the concept of intention-entropy in mobile agents that can weigh the uncertainty of the intention of mobile agents and two related technologies: intention diffusing and intention decomposing. Based on the theory, this thesis puts forward a security mechanism of mobile agents based on intention. This mechanism nested uses the two technologies to conceal the true intention of mobile agents and increase the tampering difficulty of malicious host. The third chapter analyzes its security and discusses its advantage, disadvantage and existed problems. Which establishes the foundation of the farther developing .The fourth chapter introduces the combination of this mechanism and anonymous mechanism. Which enhances the independence of the mobile agents and increases the security of mobile agents. The last chapter sums up the researches of this thesis and the developing direction in future.
Keywords/Search Tags:Mobile Agent, Malicious Host, Intention Entropy, Intention Diffusing, Intention Decomposing, Anonymous Mechanism
PDF Full Text Request
Related items