Mobile Agents Research Papers - Academia.edu (original) (raw)
This paper introduces AntNet, a new routing algorithm for telecommunication networks. AntNet is an adaptive, distributed, mobile-agents-based algorithm which was inspired by recent work on the ant colony metaphor. We apply AntNet in a... more
This paper introduces AntNet, a new routing algorithm for telecommunication networks. AntNet is an adaptive, distributed, mobile-agents-based algorithm which was inspired by recent work on the ant colony metaphor. We apply AntNet in a datagram network and compare it with both static and adaptive state-of-the-art routing algorithms. We ran experiments for various paradigmatic temporal and spatial traffic distributions. AntNet showed both very good performances and robustness under all the experimental conditions with respect to its competitors.
- by Damianos Gavalas and +2
- •
- Computer Networks, Network Management, Middleware, Mobile Code
- by wael tawah
- •
- Mobile Agents
Wireless sensor network (WSN) is the network of hundreds and thousands of micro-sensor nodes, connecting each other by a wireless medium.WSN provide reliable sensing of the environment, detecting and reporting events to the sink. One of... more
Wireless sensor network (WSN) is the network of hundreds and thousands of micro-sensor nodes,
connecting each other by a wireless medium.WSN provide reliable sensing of the environment, detecting
and reporting events to the sink. One of the most important constraints of WSN is energy consumption.
Since the micro sensors are small in dimension, batteries are necessary to produce power to the network. In
this paper, we have proposed an algorithm for hierarchy based protocols of wireless sensor networks,
which consist of two groups of sensor nodes in a single cluster node. Each cluster consists of a three cluster
head. The event driven data sensing mechanism is used in this paper and this sensed data is transmitted to
the master section head. The gathered data is transmitted to the sink via mobile agent. Hence efficient way
of data transmission is possible with larger group of nodes. In this approach of using hierarchy based
protocols; the lifetime of the sensor network is increased. This paper proposes an innovative approach of
cluster head election. The results are compared with LEACH protocol and proved to be energy efficient.
Wireless sensor network (WSN) is the network of hundreds and thousands of micro-sensor nodes,connecting each other by a wireless medium.WSN provide reliable sensing of the environment, detecting and reporting events to the sink. One of... more
Wireless sensor network (WSN) is the network of hundreds and thousands of micro-sensor nodes,connecting each other by a wireless medium.WSN provide reliable sensing of the environment, detecting
and reporting events to the sink. One of the most important constraints of WSN is energy consumption.Since the micro sensors are small in dimension, batteries are necessary to produce power to the network. Inthis paper, we have proposed an algorithm for hierarchy based protocols of wireless sensor networks,
which consist of two groups of sensor nodes in a single cluster node. Each cluster consists of a three clusterhead. The event driven data sensing mechanism is used in this paper and this sensed data is transmitted to
the master section head. The gathered data is transmitted to the sink via mobile agent. Hence efficient way
of data transmission is possible with larger group of nodes. In this approach of using hierarchy based protocols; the lifetime of the sensor network is increased. This paper proposes an innovative approach of cluster head election. The results are compared with LEACH protocol and proved to be energy efficient
Εισαγωγή Η έννοια της Τεχνητής Νοημοσύνης (Artificial Intelligence) [ΤΝ] φαίνεται πως εμφανίστηκε για πρώτη φορά το 1950, σε μια μελέτη του Άλαν Τούρινγκ (1912-1954) στην οποία έθεσε το ερώτημα: «Μπορούν οι μηχανές να σκεφτούν;» 1 Ο όρος... more
Εισαγωγή Η έννοια της Τεχνητής Νοημοσύνης (Artificial Intelligence) [ΤΝ] φαίνεται πως εμφανίστηκε για πρώτη φορά το 1950, σε μια μελέτη του Άλαν Τούρινγκ (1912-1954) στην οποία έθεσε το ερώτημα: «Μπορούν οι μηχανές να σκεφτούν;» 1 Ο όρος καθαυτός φαίνεται πως διατυπώθηκε για πρώτη φορά σε ένα συνέδριο ερευνητών από τους χώρους των Μαθηματικών, της Ηλεκτρονικής και της Ψυχολογίας που έλαβε χώρα στο Dartmouth College το 1956 και αφορούσε στη διερεύνηση των δυνατοτήτων για τη χρήση των υπολογιστών στην προσομοίωση της ανθρώπινης νοημοσύνης.
Στο πρόσφατο παρελθόν το εμπόριο διεξαγόταν με καθαρά συμβατικά μέσα. Για την υλοποίηση μια επιθυμητής αγοράς ή για τη χρήση μια υπηρεσίας οι καταναλωτές έπρεπε να μεταβούν στην έδρα του προμηθευτή των αγαθών ή των υπηρεσιών και να γίνει... more
Στο πρόσφατο παρελθόν το εμπόριο διεξαγόταν με καθαρά συμβατικά μέσα. Για την υλοποίηση μια επιθυμητής αγοράς ή για τη χρήση μια υπηρεσίας οι καταναλωτές έπρεπε να μεταβούν στην έδρα του προμηθευτή των αγαθών ή των υπηρεσιών και να γίνει εκεί η οποιαδήποτε συναλλαγή. Πλέον ο τρόπος και οι διαδικασίες για την υλοποίηση συναλλαγών έχει αλλάξει ριζικά. Ένας σύγχρονος και ταχύτατος τρόπος εξυπηρέτησης των καταναλωτών είναι η εφαρμογή του Ηλεκτρονικού Εμπορίου το οποίο συνεχίζει να εξελίσσεται και να αναπτύσσεται στο εξωτερικό, αλλά και στην Ελλάδα με πιο βραδείς ρυθμούς. Οι έννοιες που σχετίζονται με το ηλεκτρονικό εμπόριο (e-commerce) και αφορούν την επιχειρηματική δραστηριότητα είναι το e-επιχειρείν (e-business) και οι ηλεκτρονικές αγορές (e-marketplaces). Αυτές οι έννοιες είναι άμεσα συνδεδεμένες μεταξύ τους αλλά διαφορετικές.
With the recent service enhancements over the Internet, organisations are confronted with a growing magnitude of security intrusions and attacks. Current intrusion detection strategies have not been effective in the long term, as new and... more
With the recent service enhancements over the Internet, organisations are confronted with a growing magnitude of security intrusions and attacks. Current intrusion detection strategies have not been effective in the long term, as new and obfuscated security attacks keep emerging evading the surveillance mechanisms. With information technology (IT) playing a pivotal role in today's organizational operations and value creation, security regulatory bodies have identified this situation not solely as a technology issue, rather due to the weakness of an organisation's risk management practices and IT governance. Hence, recent attention has embarked on formulating proactive IT security governance for organisational sustenance. This paper proposes an autonomic framework for IT security governance that postulates a self-learning adaptive mechanism for an effective intrusion detection and risk management. Such a framework would facilitate autonomic ways of integrating existing context-dependent knowledge with new observed behaviour patterns gathered from network as well as host for detecting unknown security attacks effectively using mobile agents. In addition, this paper provides a roadmap for autonomic IT security governance by applying the proposed framework The roadmap employs a continuous improvement feedback loop. for achieving the targeted quality of service (QoS) in an organisation.
Rapid growth and expansion of information and communication technology (ICT) have set the pace for an electronic revolution leading to adoption of e-marketplace within the small and medium enterprises (SMEs). Locally, this growth in ICT... more
Rapid growth and expansion of information and communication technology (ICT) have set the pace for an electronic revolution leading to adoption of e-marketplace within the small and medium enterprises (SMEs). Locally, this growth in ICT promises to further bolster the SMEs' position as the engine of growth for the Malaysia economy. However, there are various challenges and issues in setting up an e-marketplace in developing countries which appear to impede the growth of e-marketplace. In this paper, the realities of e-business adoption in Malaysian wood based products industry are discussed. This leads to the proposal of an integrated e-marketplace framework. This framework integrates different types of business mechanisms to facilitate in the trading of wood-based products in Malaysia. These mechanisms comprise of a third-party intermediary portal, mobile agent-based multi-attribute reverse auction and an e-negotiation feature that incorporates the use of the short messaging system service.
Most current IDS are generally centralized and suffer from significant limitations when used in high speed networks, especially when they face distributed attacks. This paper shows that the use of mobile agents has practical ad- vantages... more
Most current IDS are generally centralized and suffer from significant limitations when used in high speed networks, especially when they face distributed attacks. This paper shows that the use of mobile agents has practical ad- vantages for intrusion detection. For this purpose we carried out a comparative experimental study of some IDS, showing their limits and then we propose an implementation of a new MAFIDS (Mobile Agent for Intrusion Detection System) model focusing on misuse approach. The performance of MAFIDS is investigated in terms of detection delay, false alarm and detection rate by comparing it to a centralized IDS over real traffic and a set of simulated attacks.
Mobile agents have been with us for a quite long time, showing their usefulness when it comes to developing distributed information systems. In particular, their dynamism, mobility, and adaptivity have been shown to be especially... more
Mobile agents have been with us for a quite long time, showing their usefulness when it comes to developing distributed information systems. In particular, their dynamism, mobility, and adaptivity have been shown to be especially well-suited to deal with different problems that arise in mobile computing scenarios: the need for efficient access to heterogeneous and distributed data sources, dynamic load balancing, robustness in unstable connections and communicationfailures, etc. Indeed, developing mobile games using mobile agents technology would benefit from these characteristics in terms of infrastructures and on-demand deployment, but this is not the only benefit they could obtain from it.
In this paper, we advocate using the paradigm of software
mobile agents to enhance mobile games design. By exploiting their mobility, context adaptivity, autonomy, and, last but not least, their intuitive design paradigm, game developers are provided with an alternative approach to design games that otherwise might be impossible to implement in an efficient manner. We illustrate this potential using a sample mobile game.
This paper deals with detection of SYN flooding attacks which are the most common type of attacks in a Mobile Agent World. We propose a new framework for the detection of flooding attacks by integrating Divergence measures over Sketch... more
This paper deals with detection of SYN flooding attacks which are the most common type of attacks in a Mobile Agent World. We propose a new framework for the detection of flooding attacks by integrating Divergence measures over Sketch data structure. We compare three divergence measures (Hellinger Distance, Chi-square and Power divergence) to analyze their detection accuracy. The performance of the proposed framework is investigated in terms of detection probability and false alarm ratio. We focus on tuning the parameter of Divergence Measures to optimize the performance. We conduct performance analysis over publicly available real IP traces, in Mobile Agent Network, integrated with flooding attacks. Our experimental results show that Power Divergence outperforms Chi-square divergence and Hellinger distance in network anomalies detection in terms of detection and false alarm.
This paper is a survey of the work, done for making an IDS fault tolerant. Architecture of IDS that uses mobile Agent provides higher scalability. Mobile Agent uses Platform for detecting Intrusions using filter Agent, co-relater agent,... more
This paper is a survey of the work, done for making an IDS fault tolerant. Architecture of IDS that uses mobile Agent provides higher scalability. Mobile Agent uses Platform for detecting Intrusions using filter Agent, co-relater agent, Interpreter agent and ...
Most devices in ubiquitous network environment have limited memory and processing power, thus they can't provide all services even when in suitable locations. Mobile agent technology could be implemented to improve resource... more
Most devices in ubiquitous network environment have limited memory and processing power, thus they can't provide all services even when in suitable locations. Mobile agent technology could be implemented to improve resource efficiency. The goal of this paper is to propose mobile agent technology in location-based service. The system consists of three parts: (1) mobile agent server, (2) location-based service
In Services Oriented Computing, a composite web service is a value-added service composed of loosely coupled, independent, and distributed component web services. Component or partner web ... more
In Services Oriented Computing, a composite web service is a value-added service composed of loosely coupled, independent, and distributed component web services. Component or partner web services jointly contribute to fulfil functional as well as non-functional requirements of users of a composite web service. One of the fundamental challenges in Services Oriented Computing is to ensure that a composite web service is flexible enough to react to changes (QoS degradation) in its partner web services at the time of execution. In this context, it is important that the time to adapt to changes should not be significant. Several solutions exist for run-time monitoring of partner web services so that clients can replace them with better alternatives when their QoS values degrade. But these solutions follow either a reactive approach (which is time consuming), or a prediction-based proactive approach (again time consuming, and moreover predicted events may never happen). This article proposes a solution using a publish/subscribe mechanism which is distributed between web service clients and the service providers, and follows a proactive preventive approach. It uses mobile agents to communicate partner web service's QoS status to its clients just in time, in order to decide to choose an alternative in case the QoS values are not satisfactory. The prototype is implemented using JAVA and Java Agent DEvelopment framework (JADE) programming languages. The experimental results show effectiveness of the proposed approach when compared with a static approach (the benchmark), as well as with a reactive solution. Moreover, the framework performs well even in the wake of the increasing levels of QoS degradation of partner web services.
PABADIS'PROMISE (PABADIS based Product Oriented Manufacturing Systems for Re-Configurable Enterprises) is a new European research project aiming at the improvement of the flexibility of manufacturing systems by extending the applicability... more
PABADIS'PROMISE (PABADIS based Product Oriented Manufacturing Systems for Re-Configurable Enterprises) is a new European research project aiming at the improvement of the flexibility of manufacturing systems by extending the applicability of distributed intelligence at all levels of control. This paper introduces the basis ideas of the concept and describes details of the technological and conceptual approach. After a short comparison of the state-of-the-art and former research projects in the field of flexible manufacturing systems the general architecture and functionality of a PABADIS'PROMISE would be described. The targeted enhancements would be discussed in comparison with existing systems with a special focus on the usage of mobile agent systems and RFID-technologies on the field control level. Finally, the expected benefits resulting from the implementation of a PABADIS'PROMISE system would be summarized
Intrusion detection has, over the last few years, assumed paramount importance within the broad realm of network security, more so in the case of wireless ad hoc networks. These are networks that do not have an underlying infrastructure;... more
Intrusion detection has, over the last few years, assumed paramount importance within the broad realm of network security, more so in the case of wireless ad hoc networks. These are networks that do not have an underlying infrastructure; the network topology is constantly changing. The inherently vulnerable characteristics of wireless ad hoc networks make them susceptible to attacks, and it may be too late before any counter action can take effect. Second, with so much advancement in hacking, if attackers try hard enough they will eventually succeed in infiltrating the system. This makes it important to constantly (or at least periodically) monitor what is taking place on a system and look for suspicious behavior. Intrusion detection systems (IDSs) do just that: monitor audit data, look for intrusions to the system, and initiate a proper response (e.g., email the systems administrator, start an automatic retaliation). As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response. In this article we present a survey on the work that has been done in the area of intrusion detection in mobile ad hoc networks.
Increasing performance and decreasing cost of microprocessors are making it feasible to move more processing power to the data source. This allows us to investigate new methods of storage delivery and storage management that were not... more
Increasing performance and decreasing cost of microprocessors are making it feasible to move more processing power to the data source. This allows us to investigate new methods of storage delivery and storage management that were not plausible in the past. Our architecture, inspired by agent-based techniques and active disk technology, promotes an open storage management framework that embeds functionality into storage devices. We use local agents to implement self-control with automated capability that can be dynamically adapted to meet the storage management through improved search capabilities in the virtual environment and also retain capabilities like: security, performance and availability requirements.
A mobile agent is a particular type of agent with the ability to migrate from one host to another where it can resume its execution. Mobile agents can be used in applications for wireless network to save bandwidth and time. In this paper... more
A mobile agent is a particular type of agent with the ability to migrate from one host to another where it can resume its execution. Mobile agents can be used in applications for wireless network to save bandwidth and time. In this paper we consider dependability aspect, especially reliability issues that need to be addressed before the mobile agents can be used for a broad range of commercial applications in mobile adhoc network (MANET). The MANET introduces new aspects to dependability affecting reliability of the services of the mobile agent based system. In this paper, we propose an algorithm for estimating the task route reliability of mobile agent systems (MAS), which are based on the conditions of the underlying wireless network. The agents can select their route dynamically. The complexity of mobile agent network systems makes it hard to obtain the route reliability of the MAS theoretically; instead we estimate it using Monte Carlo simulation. In this paper, we assume that the MAS consist of a number of independent mobile agents operating simultaneously. The paper estimates the reliability of mobile agent system considering different failures of the underlying network. The results achieved demonstrate the robustness of the proposed algorithm. This paper demonstrates a reliability estimation model for MAS in MANET and shows that reliability is almost independent on the no. of agents (for higher no. of agents) or no. of mobile nodes but highly dependent on the condition of the links especially on the connectivity of the graph.
The agent-based approach is an effective one for building middleware interconnecting distributed heterogeneous resources and providing semantic interoperability among them. On the other hand, agents need the semantic Web technologies for... more
The agent-based approach is an effective one for building middleware interconnecting distributed heterogeneous resources and providing semantic interoperability among them. On the other hand, agents need the semantic Web technologies for flexible yet effective coordination among them with a particular issue of enabling agents to communicate not only about the domain but also about their own abilities, goals, and present and intended actions. This paper describes semantic agent programming language (SAPL)intended to be a core middleware language for the semantic Web. S-APL integrates the semantic description of the domain resources with the semantic prescription of the agents' behaviors. Additionally, S-APL can be used as the content language in the inter-agent communications, both in querying for data and in requesting for action.
Telemedicine is a particularly useful means to optimize the quality of care by fast medical exchanges that benefit patients whose state of health requires an appropriate and fast response, regardless of their geographic location. In this... more
Telemedicine is a particularly useful means to optimize the quality of care by fast medical exchanges that benefit patients whose state of health requires an appropriate and fast response, regardless of their geographic location. In this paper, the authors propose a mobile agent based architecture (DiabMAS) for remote medical monitoring of diabetic patients on an outpatient basis using mobile devices (laptops, PDAs, etc ...) by exploring the new operating Mobile system, Android. DiabMAS is a multi-agent system having as main objective the improvement of the transmission of information between patients and their physicians, especially the management of specific and critical cases.