Home
Author Guide
Editor Guide
Reviewer Guide
Special Issues
Special Issue Introduction
Special Issues List
Topics
Published Issues
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2010
2009
2008
2007
2006
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access Policy
Publication Ethics
Digital Preservation Policy
Editorial Process
Subscription
Contact Us
General Information
ISSN:
1796-2021 (Online); 2374-4367 (Print)
Abbreviated Title:
J. Commun.
Frequency:
Monthly
DOI:
10.12720/jcm
Abstracting/Indexing:
Scopus
;
DBLP
;
CrossRef
,
EBSCO
,
Google Scholar
;
CNKI,
etc.
E-mail questions
or comments to
editor@jocm.us
Acceptance Rate:
27%
APC:
800 USD
Average Days to Accept:
88 days
3.4
2023
CiteScore
51st percentile
Powered by
Article Metrics in Dimensions
Editor-in-Chief
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
[Read More]
What's New
2024-11-25
Vol. 19, No. 11 has been published online!
2024-10-16
Vol. 19, No. 10 has been published online!
2024-08-20
Vol. 19, No. 8 has been published online!
Home
>
Published Issues
>
2020
>
Volume 15, No. 3, March 2020
>
Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms
Sophia Alami-Kamouri, Nabil Moukafih, Ghizlane Orhanou, and Said Elhajji
Laboratory of Mathematics, Computer Sciences and Applications-Information Security Faculty of Sciences, Mohammed V University in Rabat. Morocco
Abstract
—Mobile agent technology quickly emerged in the field of distributed computing. Its use offers several advantages compared to the classic Client / Server model such as reducing network traffic, using disconnected computing, and offering more flexibility in application development, etc. Although mobile agent technology is considered as a powerful tool, it has some security problems that need to be overcome. Mobile agents, due to their mobility are vulnerable to attacks in a hostile environment. For this reason, it is necessary to put effective security techniques to protect them when they move from their home host to a new one. In this paper, we propose two security mechanisms to enhance mobile agent security. On one hand, we use a cryptographic trace to ensure mobile agent integrity and origin authentication, and on the other hand an SOS agent monitor’s model is proposed to protect the mobile agent system against malicious hosts and DOS attacks. An implementation of the SOS agent approach will be presented.
Index Terms
—Mobile agent, security, SOS agent, cryptographic trace.
Cite: Sophia Alami-Kamouri, Nabil Moukafih, Ghizlane Orhanou, and Said Elhajji, "Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms,” Journal of Communications vol. 15, no. 3, pp. 221-230, March 2020. Doi: 10.12720/jcm.15.3.221-230
Copyright © 2020 by the authors. This is an open access article distributed under the Creative Commons Attribution License (
CC BY-NC-ND 4.0
), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.
1-JCM170472
PREVIOUS PAPER
First page
NEXT PAPER
An Advanced Criterion of Permutation Set for SCMA