Skip to main navigation Skip to search Skip to main content

Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A mobile agent is a program which represents a user in a network and is capable of migrating from one node to another node, performing computations on behalf of the user. In this paper, we suggest a scheme that can safely recover mobile agent using the checkpoint that is saved at the platform that it visited previously and restart it's execution from the abnormal termination point of the mobile agent. For security, mobile agent uses it's public key to encrypt the checkpoint and the home platform uses the private key of the mobile agent to decrypt the encrypted checkpoints at the recovery stage. When home platform receives the checkpoint of the mobile agent, home platform verifies the checkpoint using message digest. Home platform verifies the correctness of the checkpoint by comparing the message digest generated at checkpoint creation time with the message digest generated at mobile agent recovery time.

Original languageEnglish
Title of host publication16th International Conference on Computer Applications in Industry and Engineering 2003, CAINE 2003
EditorsKendall E. Nygard
PublisherInternational Society for Computers and Their Applications (ISCA)
Pages40-43
Number of pages4
ISBN (Electronic)9781618395368
StatePublished - 2003
Event16th International Conference on Computer Applications in Industry and Engineering, CAINE 2003 - Las Vegas, United States
Duration: 11 Nov 200313 Nov 2003

Publication series

Name16th International Conference on Computer Applications in Industry and Engineering 2003, CAINE 2003

Conference

Conference16th International Conference on Computer Applications in Industry and Engineering, CAINE 2003
Country/TerritoryUnited States
CityLas Vegas
Period11/11/0313/11/03

Keywords

  • checkpoint
  • fault tolerant
  • itinerary
  • migration
  • mobile agent

Fingerprint

Dive into the research topics of 'Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints'. Together they form a unique fingerprint.

Cite this