An Optimized Authentication Mechanism for Mobile Agents by Using Machine Learning

Full Text (PDF, 414KB), PP.30-39

Views: 0 Downloads: 0

Author(s)

Pradeep Kumar 1,2,* Niraj Singhal 2 Mohammad Asim 3 Avimanyou Vatsa 4

1. JSS Academy of Technical Education, Noida /Department of Computer Science and Engineering, Uttar Pradesh, 201301, India

2. Shobhit Institute of Engineering & Technology (Deemed to-be-University), Meerut, 250110, India

3. MGM College of Engineering and Technology, Noida/ Department of computer Science and Engineering, Uttar Pradesh, 201301, India

4. Gildart Haase School of Computer Sciences and Engineering, Fairleigh Dickinson University New Jersey USA

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2023.06.03

Received: 8 Apr. 2022 / Revised: 21 Jun. 2022 / Accepted: 15 Aug. 2022 / Published: 8 Dec. 2023

Index Terms

Mobile Agents, Degree of Mobility, Hopfield Neural Network, Distributing Computing

Abstract

A mobile agent is a small piece of software which works on direction of its source platform on a regular basis. Because mobile agents roam around wide area networks autonomously, the protection of the agents and platforms is a serious worry. The number of mobile agents-based software applications has increased dramatically over the past year. It has also enhanced the security risks associated with such applications. Most of the security mechanisms in the mobile agent architecture focus solely on platform security, leaving mobile agent safety to be a significant challenge. An efficient authentication scheme is proposed in this article to address the situation of protection and authentication of mobile agent at the hour of migration of across multiple platforms in malicious environment. An authentication mechanism for the mobile agent based on the Hopfield neural network proposed. The mobile agent’s identity and password are authenticate using the specified mechanism at the moment of execution of assigned operation. An evaluative assessment has been offered, along with their complex character, in comparison to numerous agent authentication approaches. The proposed method has been put into practice, and its different aspects have been put to the test. In contrasted to typical client-server and code-on-demand approaches, the analysis shows that computation here is often more safe and simpler.

Cite This Paper

Pradeep Kumar, Niraj Singhal, Mohammad Asim, Avimanyou Vatsa, "An Optimized Authentication Mechanism for Mobile Agents by Using Machine Learning", International Journal of Computer Network and Information Security(IJCNIS), Vol.15, No.6, pp.30-39, 2023. DOI:10.5815/ijcnis.2023.06.03

Reference

[1]W. Jansen and A. T. Karygiannis, “Mobile Agent Security.” 1999, Accessed: Jan. 14, 2022. [Online]. Available: https://www.nist.gov/publications/mobile-agent-security.
[2]P. Bagga and R. Hans, “Mobile Agents System Security,” ACM Comput. Surv., vol. 50, no. 5, pp. 1–45, 2017, doi: 10.1145/3095797.
[3]C. Zrari, H. Hachicha, and K. Ghedira, “Agent’s security during communication in mobile agents system,” Procedia Comput. Sci., vol. 60, no. 1, pp. 17–26, 2015, doi: 10.1016/j.procs.2015.08.100.
[4]P. Kumar, N. Singhal, and S. Singh, “Anonymous Scheme for Secure Mobile Agent Migration Using Mignotte’s Sequence and Back Propagation Artificial Neural Networks,” Int. J. Comput. Inf. Syst. Ind. Manag. Appl., vol. 13, no. August, pp. 192–199, 2021.
[5]Monika Arora, Indira Bhardwaj, "Artificial Intelligence in Collaborative Information System", International Journal of Modern Education and Computer Science, Vol.14, No.1, pp. 44-55, 2022.
[6]M. Niemiec, M. Mehic, and M. Voznak, “Security Verification of Artificial Neural Networks Used to Error Correction in Quantum Cryptography,” 2018 26th Telecommun. Forum, TELFOR 2018 - Proc., pp. 1–4, 2018, doi: 10.1109/TELFOR.2018.8612006.
[7]W. M. Farmer, J. D. Guttman, and V. Swarup, “Security for Mobile Agents: Issues and Requirements,” Nist, pp. 591–597, 1996, [Online]. Available: http://csrc.nist.gov/nissc/1996/papers/NISSC96/paper033/SWARUP96.PDF.
[8]Zhengbing Hu, Mykhailo Ivashchenko, Lesya Lyushenko, Dmytro Klyushnyk, " Artificial Neural Network Training Criterion Formulation Using Error Continuous Domain", International Journal of Modern Education and Computer Science, Vol.13, No.3, pp. 13-22, 2021.
[9]Rida Qayyum, Hina Ejaz, " Data Security in Mobile Cloud Computing: A State of the Art Review", International Journal of Modern Education and Computer Science, Vol.12, No.2, pp. 30-35, 2020.
[10]Olawale Surajudeen Adebayo, Shefiu Olusegun Ganiyu, Fransic Bukie Osang, Salawu, Sule Ajiboye, Kasim Mustapha Olamilekan, Lateefah Abdulazeez," Data Privacy System Using Steganography and Cryptography", International Journal of Mathematical Sciences and Computing, Vol.8, No.2, pp. 37-45, 2022.
[11]A. J. A. Wang, “Information security models and metrics,” Proc. Annu. Southeast Conf., vol. 2, pp. 2178–2184, 2005, doi: 10.1145/1167253.1167295.
[12]H. Zhong, X. Wei, and R. Shi, “A novel anonymous secret sharing scheme based on BP Artificial Neural Network,” Proc. - Int. Conf. Nat. Comput., no. Icnc, pp. 366–370, 2012, doi: 10.1109/ICNC.2012.6234550.
[13]A. Bhowmik and S. Karforma, An Approach of Secret Sharing Technique Based on Convolution Neural Network and DNA Sequence for Data Security in Wireless Communication, no. 0123456789. Springer US, 2022.
[14]S. Santhanalakshmi, K. Sangeeta, and G. K. Patra, “Design of group key agreement protocol using neural key synchronization,” J. Interdiscip. Math., vol. 23, no. 2, pp. 435–451, 2020, doi: 10.1080/09720502.2020.1731956.
[15]M. Sadim, N. Pratap, S. Kumar, and A. Latoria, “Hybrid neural synchronization blowfish algorithm for secret key exchange over public channels,” Mater. Today Proc., no. xxxx, 2021, doi: 10.1016/j.matpr.2020.11.363.
[16]M. S. K. Narad, “Group Authentication Using Back-propagation Neural Network,” vol. 6, no. 10, pp. 272–278, 2017, doi: 10.17148/IJARCCE.2017.61048.
[17]A. Yayik and Y. Kutlu, “Neural Network Based Cryptography,” Neural Netw. World, vol. 24, no. 2, pp. 177–192, 2014, doi: 10.14311/nnw.2014.24.011.
[18]É. Salguero Dorokhin, W. Fuertes, and E. Lascano, “On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key,” Secur. Commun. Networks, vol. 2019, 2019, doi: 10.1155/2019/8214681.
[19]S. Jhajharia, S. Mishra, and S. Bali, “Public key cryptography using neural networks and genetic algorithms,” 2013 6th Int. Conf. Contemp. Comput. IC3 2013, pp. 137–142, 2013, doi: 10.1109/IC3.2013.6612177.
[20]S. C. Satapathy, B. N. Biswal, S. K. Udgata, and J. K. Mandal, “Proceedings of the 3rd international conference on frontiers of intelligent computing: Theory and applications (FICTA) 2014: Volume 2,” Adv. Intell. Syst. Comput., vol. 328, pp. 217–224, 2015, doi: 10.1007/978-3-319-12012-6.
[21]M. Coutinho, R. de O. Albuquerque, F. Borges, L. J. G. Villalba, and T. H. Kim, “Learning perfectly secure cryptography to protect communications with adversarial neural cryptography,” Sensors (Switzerland), vol. 18, no. 5, pp. 1–16, 2018, doi: 10.3390/s18051306.
[22]S. Wang and H. Wang, “Password authentication using Hopfield neural networks,” IEEE Trans. Syst. Man Cybern. Part C Appl. Rev., vol. 38, no. 2, pp. 265–268, 2008, doi: 10.1109/TSMCC.2007.913901.
[23]A. T. Maolood and A. T. Khudhair, “Towards generating robust key based on neural networks and Chaos theory,” Iraqi J. Sci., vol. 59, no. 3, pp. 1518–1530, 2018, doi: 10.24996/IJS.2018.59.3B.18.
[24]Y. Liu, C. Yang, Y. Wang, L. Zhu, and W. Ji, “Cheating identifiable secret sharing scheme using symmetric bivariate polynomial,” Inf. Sci. (Ny)., vol. 453, pp. 21–29, 2018, doi: 10.1016/j.ins.2018.04.043.
[25]S. Kandar and B. C. Dhara, “A verifiable secret sharing scheme with combiner verification and cheater identification,” J. Inf. Secur. Appl., vol. 51, p. 102430, 2020, doi: 10.1016/j.jisa.2019.102430.
[26]H. Chen and C. C. Chang, “A Novel (t,n) Secret Sharing Scheme Based upon Euler’s Theorem,” Secur. Commun. Networks, vol. 2019, no. c, 2019, doi: 10.1155/2019/2387358.
[27]A. K. Biswas and M. Dasgupta, “ Two polynomials based ( t, n ) threshold secret sharing scheme with cheating detection ,” Cryptologia, vol. 44, no. 4, pp. 357–370, 2020, doi: 10.1080/01611194.2020.1717676.