• DocumentCode
    228331
  • Title

    Detecting vulnerabilities in secure communication using RCEE

  • Author

    Mathupriya, T. ; Nathiya, N.

  • Author_Institution
    Comput. Sci. & Eng., V.S.B. Eng. Coll., Karur, India
  • fYear
    2014
  • fDate
    13-14 Feb. 2014
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    Security and privacy issues are important with the multi-agent systems such as pervasive computing, grid computing and P2P networks which are open, anonymous and dynamic in nature. These characteristics introduces vulnerabilities and threats to providing secured communication. To minimize these threats and to manage altering behavior of malicious agent, it evaluates the trust and reputation of the interacting agents; a dynamic trust computation model called `Secured Trust´. It uses different factors to evaluate the trust of an agent and proposes a novel load balancing algorithm and effectively manage with strategic behavioral change of malicious agents and distribute workload among the service providing agents under stable condition by finding the satisfaction level. These are implemented in client server architecture to self defense the application and to detect the threat from the server application itself and runtime code execution behavior monitoring is implemented. At runtime, a monitor compares the behavior of the variants at certain synchronization points and raises an alarm when a difference is detected.
  • Keywords
    client-server systems; multi-agent systems; random codes; resource allocation; trusted computing; P2P networks; RCEE; client server architecture; dynamic trust computation model; grid computing; load balancing algorithm; malicious agent; multi-agent systems; pervasive computing; privacy issues; runtime code execution behavior monitoring; secured communication; secured trust; service providing agents; strategic behavioral change; synchronization points; Aggregates; Computational modeling; Monitoring; Peer-to-peer computing; Multi-agent system; load balancing; malicious; reputation model; runtime code execution; security; self defense; trust management;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electronics and Communication Systems (ICECS), 2014 International Conference on
  • Conference_Location
    Coimbatore
  • Print_ISBN
    978-1-4799-2321-2
  • Type

    conf

  • DOI
    10.1109/ECS.2014.6892565
  • Filename
    6892565