Safety protection method facing to mobile agent network management

A mobile agent and security protection technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as damage to resources, unavailability, illegal changes in network configuration and management parameters, and achieve resource protection and a safe operating environment Effect

Inactive Publication Date: 2006-03-08
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (2) Active attack: ① Interruption: destroying the resources of the managed network or making it unavailable
② Tampering and retransmission: The mobile agent is intercepted by a malicious node before reaching the destination, and the node may modify the code or data of the mobile agent, and then send it to ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method facing to mobile agent network management
  • Safety protection method facing to mobile agent network management
  • Safety protection method facing to mobile agent network management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] The present invention will be described in more detail according to the drawings and embodiments below.

[0098] according to figure 1 and figure 2 , the present invention is a systematic mobile agent network management-oriented security protection method, from the creation of the mobile agent in the network management station, to the execution of network management tasks in the managed node, and finally returning to the network management station to submit information, the entire network management process are all protected.

[0099] For the convenience of description, we assume that the mobile agent performing network management tasks needs to visit n managed nodes, and the Java card of each managed node stores the key of the conventional encryption and decryption algorithm and the two involved in the encryption and decryption algorithm of the public key cryptosystem. A key, let the key of the conventional encryption and decryption algorithm be K, and the encryptio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In hardware, smart cart is adopted as reliable execution environment of mobile agent; and in software, encryption techniques are adopted to ensure confidentiality and security of mobile agent and information of administer of network. Under management of validity and verification, executing task of managing network, the mobile agent is divided into public and private codes and data, which are protected by conventional encryption / decryption algorithm and encryption / decryption algorithm in published cryptographic key / secret code system. Kernel portion of mobile agent is executed in smart cart. From hardware and software synthetically, the method guarantees security of network management of mobile agent, lowers difficulty of security and protection, increases flexibility, configurability and expandability.

Description

technical field [0001] The invention is a security solution for applying distributed computing technology to an open network environment. It is mainly used to solve the security problems of network management based on mobile agents, and belongs to the cross-technical field of computer network, distributed computing and information security. Background technique [0002] In the current network management solution, most of the network management calculations are completed by the network management station. When using this method for network management, a large amount of information exchange between the management station and the managed nodes will cause a great waste of network bandwidth, and this solution cannot dynamically expand the server's ability. The above shortcomings can be alleviated by adopting the distributed computing technology of mobile agent. A mobile agent is a software entity with certain intelligence and judgment capabilities. It can migrate on a heterogen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24
Inventor 王汝传陈志
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products