Font Size: a A A

Mobile Agent Security Architecture Based On Digital Watermark

Posted on:2005-03-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2168360152455494Subject:Computer applications
Abstract/Summary:PDF Full Text Request
Mobile agents are small intelligent programs that travel around in a computer network. Mobile intelligent agent technology has drawn a tremendous amount of attention from researchers in Internet computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as well as offering a new approach to human-computer-interaction.Security of mobile agent system is one of the most difficult problems and the key issue in mobile agent research area. We introduce digital watermark technology in to mobile agent system, which is based on the achievement of predecessors in this area. We try to utilize the great advantage of digital watermark in information security aspect to make the system safer, with the concept of digital watermark we could strengthen the solidity of agent system. We make out a very novel architecture of mobile agent and discuss in detail. In this thesis, we introduce the background of mobile agent, the theory about digital watermark and security architecture. We create a new architecture of mobile agent to solve security problem, finally we verify our new concept by experiment.The idea about the security architecture based on watermark technology in this dissertation includes mobile code protection in JAVA programs, algorithms of watermark embedding, decoding and verification. We also define some protocols to insure the communication of agent safe. Security problem hurdles the evolution of mobile agent technology, which has drown great concern of researchers in information processing. There is no successful solution to the mobile agent security until now. We introduce digital watermark to search a new way to construct the secure architecture of mobile agent.
Keywords/Search Tags:mobile agent, aglet, code watermark, watermark verification protocols, digital watermark, wavelet transform, chaos sequences.
PDF Full Text Request
Related items