Dissertation > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security

Research on Security Model for Mobile Agent-Based E-Commerce Environment

Author SunHanWen
Tutor GanZaoBin
School Huazhong University of Science and Technology
Course Applied Computer Technology
Keywords E-commerce Mobile Agent Routing Request Migration Limit execution Fault-tolerant
CLC TP393.08
Type Master's thesis
Year 2011
Downloads 12
Quotes 0
Download Dissertation

The birth of the Mobile Agent technology has brought a revolution in the field of electronic commerce research , the smart e-commerce to become the future direction of development of the e-commerce model . However , due to the characteristics of mobility and intelligence of the mobile Agent has two sides , it injected new vitality to the e-commerce research at the same time , it also brings a new , non-traditional security issues , which became hinder intelligent e further the bottleneck of the development . Thus, it is necessary to solve the security issues of mobile Agent , Mobile Agent Migration safety is one of the difficulties of the current study . Security issues facing mobile agent migration process and the lack of existing security policy , based on a public key encryption system , the proposed Mobile Agent Security migration model with fault tolerance and time frame mechanisms SecRoute . In the safety of the migration model , with a strong authentication system , and the introduction of a trusted third party platform . In migration between nodes taken a similar request many handshakes migration and validation algorithm can effectively detect the migration of conventional single point of failure to ensure the accuracy and safety of the migration . Meanwhile, in the Mobile Agent migration execution process , the use of a trusted platform limited hour perform detection , the repetitive execution of the malicious host can effectively detect and blocking attacks . Failure recovery in the event of failure , redundant backup mechanism to prevent the migration interrupt , and effectively improve the security and robustness of the migration . The IBM Aglets platform using the Java language SecRoute algorithm simulation and results analysis proved the effectiveness and feasibility of the algorithm . And comparative analysis of other algorithms , the algorithm in terms of authentication , fault detection and fault tolerance showed good performance . Finally, the algorithm tests the mobile agent e - commerce environment , verify the effectiveness and feasibility of SecRoute algorithm in the application environment .

Related Dissertations
More Dissertations