Dispatching mobile agents with secure routes in parallel

Yan Wang, Kian Lee Tan

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

6 Citations (Scopus)

Abstract

In a distributed environment like the Internet, mobile agents can be employed to perform autonomous tasks such as searching and negotiating. However, for mobile agents to be widely accepted, performance and security issues on their use have to be addressed. In this paper, we propose a parallel dispatch model with secure route structures for protecting the dispatch routes of agents. This model facilitates efficient dispatching of agents in a hierarchical manner, and ensures route security by exposing minimal route information to hosts. To further enhance route robustness, we also propose a mechanism with substitute routes that can bypass temporarily unreachable hosts, using substitute hosts for deploying right dispatch branches and make later attempts to these failed hosts.

Original languageEnglish
Title of host publicationInformation and Communications Security - 3rd International Conference, ICICS 2001, Proceedings
EditorsSihan Qing, Tatsuaki Okamoto, Jianying Zhou
Place of PublicationBerlin, Heidelberg
PublisherSpringer, Springer Nature
Pages386-397
Number of pages12
Volume2229
ISBN (Print)3540428801, 9783540428800
Publication statusPublished - 2001
Externally publishedYes
Event3rd International Conference on Information and Communications Security, ICICS 2001 - Xian, China
Duration: 13 Nov 200116 Nov 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2229
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other3rd International Conference on Information and Communications Security, ICICS 2001
CountryChina
CityXian
Period13/11/0116/11/01

Fingerprint

Dive into the research topics of 'Dispatching mobile agents with secure routes in parallel'. Together they form a unique fingerprint.

Cite this