Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/277556
Title: | A novel approach for secure data transfer using mobile agents in distributed environment |
Researcher: | Adri jovin J J |
Guide(s): | Marikkannan M |
Keywords: | Engineering and Technology,Computer Science,Computer Science Interdisciplinary Applications Distributed environment Data Transfer |
University: | Anna University |
Completed Date: | 2018 |
Abstract: | Mobile agent system provides a promising solution for applications in distributed systems where fault tolerance, performance and reliability are the key requirements. The degree of autonomy and intelligence possessed by a mobile agent helps to resolve a number of problems, especially related to network management and security. In most cases, the interoperability and adaptability of the mobile agent technology make it newlinepossible to supplement it with latest systems. Despite the advantages of autonomy and intelligence, mobile agents are prone to security threats and attacks.A number of security mechanisms are provided to ensure the security of data carried by the mobile agent. Chaos-based cryptography is one of the most secure cryptographic techniques. This technique has not already been experimented in the mobile agent environment. The Chebyshev polynomial based chaotic cryptography hybridized with ElGamal encryption newlineis experimented in the mobile agent environment. The hybridization is almost newlineakin to signcryption, a data security mechanism. The theoretical security newlineanalysis shows that the chaos-based cryptography is immune to most security newlineattacks. On analysis, in terms of execution time and throughput, it is found newlinethat the chaos-based cryptography is less performing compared to that of newlinehomomorphic and signcryption schemes. Chaos-based cryptography exhibits newlinea higher execution time compared to that of homomorphic and signcryption newlinetechniques. Also, chaos-based cryptography has a less throughput compared newlineto that of the homomorphic and signcryption schemes. However, chaos-based newlinecryptography is more secure because it is less possible to guess the key and newlinethe floating operations involved newline newline |
Pagination: | xviii, 121 p. |
URI: | http://hdl.handle.net/10603/277556 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 17.61 kB | Adobe PDF | View/Open |
02_certificates.pdf | 2.98 MB | Adobe PDF | View/Open | |
03_abstract.pdf | 31.37 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 81.11 kB | Adobe PDF | View/Open | |
05_content.pdf | 4.32 MB | Adobe PDF | View/Open | |
06_chapter1.pdf | 137.84 kB | Adobe PDF | View/Open | |
07_chapter2.pdf | 179.01 kB | Adobe PDF | View/Open | |
08_chapter3.pdf | 172.25 kB | Adobe PDF | View/Open | |
09_chapter4.pdf | 538.78 kB | Adobe PDF | View/Open | |
10_chapter5.pdf | 618.6 kB | Adobe PDF | View/Open | |
11_chapter6.pdf | 458.21 kB | Adobe PDF | View/Open | |
12_chapter7.pdf | 86.16 kB | Adobe PDF | View/Open | |
13_references.pdf | 174.41 kB | Adobe PDF | View/Open | |
14_publications.pdf | 134.63 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: