Light-weight Authentication System and Resource Monitoring using MAS

Abhilasha Sharma, Rajdeep Singh, Jitendra S Rathore

Abstract


Application, resource and Network supervision and trust management is a significant issue due to today’s speedily development of computer and communication environment specially in Local Area Network (LAN).Client-server  based  network  management approach suffer  from  problems such  as  insufficient scalability, interoperability,  reliability,  and  flexibility,  as networks become more geographically distributed [1]. Another big issue is trust management. RSA, DES and Kerberos is another good methods to achieve authentication but require but high computation is a big deal for LAN, another issue is availability.  In this paper, we have proposed a new (novel) light weight approach for resource and trust management using the concept of Multi agent system. Proposed method used the concept of certificate authority (AS of Kerberos) for authenticating the users in LAN or peer to peer network. Availability and minimum delay are the key factor of any authentication scheme, in this paper we proposed a fresh new concept for authenticity and supervision of resources. Our Mobile agent based solution will work same as Kerberos with better throughput and with high availability due to distributed and roaming features of MAS system. Proposed method provides good solution for trust management as well as supervision for network resource and application. We have used SPADE for development of MAS.


Keywords


Authentication, kerberos ,MAS ,Resource management, SPADE

References


Hosoon Ku, Gottfried W.R. Luderer and Baranitharan Subbiah “An Intelligent Mobile Agent Framework for Distributed Network Management”, Global Telecommunications Conference, GLOBECOM '97, IEEE, 1997.

Jaleh Shoshtarian Malak, Mehran Mohsenzadeh and Mir Ali Seyyedi “Multi Agent Based Web Service QoS Management Architecture”, Proceedings of the 14th International CSI Computer Conference (CSICC'09),IEEE,2009.

Foundation for Intelligent Physical Agents, http://fipa.org/, 2005. [Online; accessed 12-July-2011.

J.D. Case, M. Fedor, M.L. Schoffstall and C. Davin: RFC1157 “Simple Network Management protocol (SNMP)”, 1990.

C. Sylvia: “The Future with or without SNMP”, LAN Management 1996.

K. Meyer, M. Erlinger, J. Betser, and C. Sunshine:“Decentralization Control and Intelligence in Network Management”, Proceedings of the 4th International Symposium on Integrated Network Management, CA May 1995.

M. Post, C. Shen and J. Wei “The Manager/Agent Paradigm for Distributed Network Management” IEEE Network Operations and Management Symposium, Japan, April, 1996.

Ghanea-Hercock, R. “An agent-based user-authentication system”, Intelligent Systems, IEEE, 2003.

Ghanea-Hercock, R “Authentication with P2P Agents”, BT Technology Journal, Springer Netherlands, 2003.

SPADE tool, http://code.google.com/p/spade2/

Chandra Krintz “Security in Agent-based Computing environments Using Existing Tools: A Survey”, cite seer, 1998.

Punit Mundra, Shobhit Shukla, Madhavi Sharma, Radhika M Pai and Sanjay Singh “Modeling and Verification of Kerberos Protocol using Symbolic Model Verifier”, IEEE, International Conference on Communication Systems and Network Technologies,2011.

Marcel Waldvogel, Germano Caronni, Dan Sun, Nathalie Weiler and Bernhard Plattner “The VersaKey Framework: Versatile Group Key Management”, IEEE Journal on Selected Areas In Communications, Vol. 17, No. 9, August 1999.

R. Braden, D. Clark, and S. Shenker, “RSVP: A new resource reservation protocol,” IEEE Network, September 1993.

W. Feng, D. Kandlur, D. Saha, and K. Shin, “Adaptive packet marking for providing differentiated services in the internet,” in Proceedings of ICNP-98, October 1998.

Steve McCanne, “A distributed whiteboard for network conferencing,” http://http.cs.Berkeley.edu/ ˜mccanne/unpublished.html, 1992.

M. Handley and J. Crowcroft, “Network text editor (NTE): A scalable shared text editor for the MBone,” in Proceedings of ACM SIGCOMM ’97, September 1997, pp. 197–208.

Khan, A.Basit and Mihhail Matskin “AGORA Framework for Service Discovery and Resource Allocation”, IEEE, Fifth International Conference on Internet and Web Applications and Services, 2010.

S.J. Russell and P. Norvig “Artificial intelligence: a modern approach”, Prentice-Hall, Inc. Upper Saddle River, NJ, USA, 1995.

T. Finin, R. Fritzson, D. McKay, and R. McEntire. Kqml as an agent communication language. Proceedings of the third international conference on Information and knowledge management, pages 456–463, 1994.

FIPA TC Communication. Fipa acl message structure specification. FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS retriever from http://fipa.org/repository/standardspecs.html on 01-12-2009, 2003.

E. Oliveira and A.P.Rocha “Agents advanced features for negotiation in electronic commerce and virtual organisations formation process”, Agent Mediated Electronic Commerce: The European Agentlink Perspective, 2001.

Y. Luo D. Davis and K. Liu. “A multi-agent framework for stock trading”,School of Computing, Staffordshire University, Stafford ST18 0DG, UK, Department of Computer Science, University of Hull, HU6 7RX, UK ,2000.

B. Mobasher J. Collins, M.Tsvetovat and M. Gini. Magnet “A multi-agent contracting system for plan execution”, In Proc. of SIGMAN, pages 63–68, 1998.

A. Pannu K. Sycara, K. Decker. Distributed intelligent agents. 1996.

K. SYCARA S. DECKER “Intelligent adaptive information agents”, Journal of Intelligent Information Systems, Volume 9:239–260, November 1997.

A.H. Sung S. Mukkamala and A. Abraham “Hybrid multi-agent framework for detection of stealthy probes”, Applied Soft Computing Journal, 7(3):631–641, 2007.

XMPP Protocol, http://xmpp.org/xmpp-protocols/protocol-namespaces/

Marcel Waldvogel, Germano Caronni, Dan Sun, Nathalie Weiler and Bernhard Plattner “The VersaKey Framework: Versatile Group Key Management”, IEEE Journal on Selected Areas In Communications, Vol. 17, No. 9, August 1999.

R. Braden, D. Clark, and S. Shenker, “RSVP: A new resource reservation protocol,” IEEE Network, September 1993.

W. Feng, D. Kandlur, D. Saha, and K. Shin, “Adaptive packet marking for providing differentiated services in the internet,” in Proceedings of ICNP-98, October 1998.

Steve McCanne, “A distributed whiteboard for network conferencing,” http://http.cs.Berkeley.edu/ ˜mccanne/unpublished.html, 1992.

M. Handley and J. Crowcroft, “Network text editor (NTE): A scalable shared text editor for the MBone,” in Proceedings of ACM SIGCOMM ’97, September 1997, pp. 197–208.

Punit Mundra, Shobhit Shukla, Madhavi Sharma, Radhika M Pai and Sanjay Singh “Modeling and Verification of Kerberos Protocol using Symbolic Model Verifier”, IEEE, International Conference on Communication Systems and Network Technologies,2011.

Ghanea-Hercock, R. “An agent-based user-authentication system”, Intelligent Systems, IEEE, 2003.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




 


All Rights Reserved © 2012 IJARCSEE


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.