An Efficient Technique for Security of Mobile Agents

dc.contributor.guideRana, Prashant Singh
dc.coverage.spatial
dc.creator.researcherKaur, Prabhjot
dc.date.accessioned2024-11-27T11:47:11Z
dc.date.available2024-11-27T11:47:11Z
dc.date.awarded2024
dc.date.completed2024
dc.date.registered
dc.description.abstractIn the realm of wireless sensor networks, the Mobile Agent (MA) paradigm presents significant advantages over the traditional client-server model, particularly in addressing the crucial issue of energy consumption. Optimizing the itinerary for efficient data collection and considering the detection of malicious nodes are pivotal factors. We delve into the challenges and risks of securing mobile agents within extensive and dynamic sensor networks. The security of large-scale networks is paramount, especially when harnessing mobile agents to optimize network efficiency and data processing capabilities. Securing large-scale networks is crucial for protecting sensitive data, ensuring uninterrupted operations, and upholding user trust. This abstract delineates the security considerations associated with mobile agents in vast WSNs. Large-scale WSNs often operate in resource-limited and hostile environments, so they are vulnerable to various security threats, such as node compromise, data tampering, and unauthorized access. We assess potential vulnerabilities arising from mobile agent movement, communication, and data aggregation processes and scrutinize the impact of security breaches on network performance and reliability. To address these challenges, we survey state-of-the-art security mechanisms, including secure agent migration protocols, cryptographic methods for data protection, and trust management models for agent authentication and authorization. In the first scheme, our research focuses on identifying and addressing attacks to prevent communication breakdown as sensor nodes become more vulnerable in dynamic environments. We use the SPIN protocol and machine learning models to classify attacks and propose an ensemble model with 95% average accuracy. K-Fold cross-validation ensures consistency. The second scheme focuses on using the Border-Hunting Optimization-based Deep CNN (BHO-DCNN) for a mobile agent (MA)-based intrusion detection in Wireless Sensor Networks (WSN). This approach aims to accurately identify
dc.description.note
dc.format.accompanyingmaterialNone
dc.format.dimensions
dc.format.extentxx, 153p.
dc.identifier.urihttp://hdl.handle.net/10603/603313
dc.languageEnglish
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.publisher.placePatiala
dc.publisher.universityThapar Institute of Engineering and Technology
dc.relation
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordComputer networks
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Software Engineering
dc.subject.keywordEngineering and Technology
dc.subject.keywordMobile agents (Computer software)
dc.subject.keywordWireless sensor networks
dc.titleAn Efficient Technique for Security of Mobile Agents
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 14
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
136.82 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_prelimpages.pdf
Size:
4.36 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_content.pdf
Size:
53.25 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_abstract.pdf
Size:
51.55 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_chapter 1.pdf
Size:
126.66 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: