The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Agents have become a promising technology in design, implementation and maintenance of Distributed Computing Systems, as they can travel form one node to another along with their internal state. Mobile agents are capable of performing tasks which need a lot of configuration. These days, mobile agents are widely used in number of applications because of their intelligence. Although they possess...
In recent years Wireless sensor networks (WSNs) play a vital role in various real time application, by collecting a huge amount of various sensory data from the field. The routing protocol for wireless sensor networks mainly aims in the energy-efficiency of the network. Due to restricted energy, memory, transmission range, power and high traffic load, the nodes which act as a sink get depleted quickly...
Mobile agents' paradigm is increasingly being used on the global Internet, distributed systems and ambient intelligence environment. Indeed, they can provide many advantages to the development of dynamic applications. More recently, mobile agent paradigm is of the best prevalent alternatives bringing most of suitable characteristics of pervasive environments, where people are surrounded by intelligent...
Mobile agent brings new concept on programming, especially on distributed computing paradigm. It attracts great interest because of its mobility, autonomy and persistence. But it also brings security issues i.e. insecure networks, malicious agents, malicious hosts and malicious users. One most difficult issues is protecting mobile agent from malicious host because mobile agent execute its code on...
Malicious host problem is still a challenging phenomenon in agent computing environment. In mobile agent computing, agent platform has full control over mobile agent to execute it. A host can analyze the code during stay of mobile agent on that host. A host can modify the mobile code for his benefits. A host can analyze and modify the data which is previously collected during agent itinerary. Hence...
Mobile agent group concept is a versatile software paradigm capable of providing group task execution flexibility and collaborative adaptability in various application fields of distributed networked systems. However, as the size of these fields is rapidly increasing, improving the performance of the agent group communication in Internet-scale infrastructures should be reconsidered to be suitable...
Augmented reality (AR) is a promising technology for building applications in an Internet of Things (IoT) environment, utilized for visualizing information provided by IoT devices. In this paper, we enable Web-based mobile AR applications with mobile agents in a resource-oriented IoT system architecture. We present an adaptable mobile agent composition that contains the data representation logic and...
In dense mobile wireless sensor networks, it is desirable to gather sensor data from the minimum number of nodes necessary to guarantee the sensing granularity. For this aim, in our previous work, we have proposed a data gathering method using mobile agents. However, this method cannot gather all the sensor data in the situation where some mobile agents cannot be deployed due to low node density....
The paper introduces a novel offline payment system in mobile commerce using the case study of micro-payments. The present paper is an extension version of our prior study addressing on implication of secure micropayment system deploying process oriented structural design in mobile network. The previous system has broad utilization of SPKI and hash chaining to furnish reliable and secure offline transaction...
In this paper we propose an Enhanced Mobile SET (EMSET) protocol with formal verification using Mobile Agent technology and Digital Signature with Message Recovery based on ECDSA mechanism. Mobile Agent technology and Digital Signature with Message Recovery (DSMR) based on ECDSA mechanism provides in proposing EMSET protocol in Mobile Networks. Mobile Agent technology has many benefits such as bandwidth...
To reduce mobile users¡¦ dependence on effective network availability, this paper proposes mobile agent technology in mobile computing applications. This allows mobile users to perform data collection and electronic transactions in a wireless network environment. In an agent-based transaction protocol, mobile agents carry information provided by the user and are able to migrate between hosts to execute...
In this paper design aspects of application layer protocol for mobile telemetry are studied. The main design requirements include access independency and low power consumption. The protocol is on the top of Internet Protocol and has a layered structure. It provides mechanism for reliable message transfer using the transaction concept. The core protocol functions are domain specific and they are described...
Technological advances in Information and Communication Technology (ICT) have led to the proliferation and deployment of mobile and wireless devices which are still being managed by conventional Network Management Systems (NMS). Due to their operational characteristics which allow these mobile devices to transition into lower energy consuming states, effective management of these networks is becoming...
A mobile ad hoc network consists of only mobile nodes without the access points and the center server. In the mobile ad hoc network environment, a set of nodes in the network and the network topology are frequently changing due to the node appearance, the node disappearance, and the node movement so that it is not easy for users in the network to obtain the services provided in the network. Therefore,...
Mobile code is an important programming paradigm for our increasingly networked world. However the benefits offered have not been sufficient to simulate their wide spread deployment, the main reason is their inherent security. This paper introduces a protocol based on publicly verified signature chain, execution tracing and centralized Trusted Third Party (TTP) scheme. The protocol allows detection...
Many intrusion detection algorithms have been proposed to detect network attacks on Mobile Ad-Hoc Networks (MANET). Most of such proposals require extensive modifications to routing algorithms or lower layers which might not be always feasible in practice. This paper proposes a simple but non-trivial scheme TraceGray, that uses mobile agents (MA) to carry out intrusion detection in a MANET without...
We propose a network management system which is suitable to disaster situation in U-city environment. U-city is a smart city with the intelligent convergence system that integrates IT technology and urban engineering technology such as environment, road traffic, safe and GIS. The network used in U-city should provide services without transmission failure and support functionality which enlarges the...
Mobile web services create an open distributed system that makes any enterprise and individual in any place utilize mobile web service and engage in various business activities. These characteristics make web services an ideal solution of enterprise application and integration. Software agents are able to integrate different mobile web services into a unique solution. Beginning with the basic framework...
Dependable communication capabilities, effective opportunistic resource allocation and information Dissemination strategy are amongst the most important technical requirements for the tactical Information Dissemination Management system (IDM-T). This paper introduces a mobile agent-based architecture that supports both point-to-point messaging and hierarchical data-streaming. The opportunistic resource...
Mobile sink brings new challenges to densely deployed and large wireless sensor networks (WSNs). When the sink moves, frequent location updates from the sink can generate excessive power consumption of sensors. In this paper, we propose IAR, an Intelligent Agent-based Routing protocol that provides efficient data delivery to mobile sink. Proposed algorithm reduces signal overhead and improve degraded...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.