• AHMED MAQBOL LINFI laboratory, Computer science department, Biskra University, Algeria
  • OKBA KAZAR LINFI laboratory, Computer science department, Biskra University, Algeria


The security in the communication process is an important issue since the days of homing pigeons, where the people accustomed to send encrypted messages. In nowadays, with the technologies development, this issue is considered as a research field, which take a great part of attention. The mobile ad hoc network is aspect of the evolution of communication technology; it is defined a collection of mobile nodes, with no fixed infrastructure, resource constraints, communicate with each other using the radio medium, and dynamic creation and organization. The security issue is becoming a main concern in the applications of mobile ad hoc network.
In this paper, we propose a security protocol for a mobile ad hoc networks based mobile agent, where the network is consisting of a set of nodes, each node has node agent for resources estimation of the node and communicate with others agents. The network is divided into a set of clusters; each cluster has to elect a node to be the head cluster, where the monitor agent will be reside. This monitor agent controls the communication inside cluster by collecting and analysing the data from the others nodes, it creates an inspector agent, which can move from one node to another to act like a local IDS in the visited node.


[1] Sarkar, S. K., Basavaraju, T. G., & Puttamadappa, C. (2007). Ad hoc mobile wireless networks: principles, protocols and applications. CRC Press.
[2] Roy, R. R. (2010). Handbook of mobile ad hoc networks for mobility models. Springer Science & Business Media.
[3] Gavrilovska, L., & Prasad, R. (2006). Ad hoc networking towards seamless communications (p. 284). Heidelberg: Springer.
[4] Nemati, H. (Ed.). (2007). Information Security and Ethics: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications. IGI Global.
[5] Datta, A. K., Larmore, L. L., & Vemula, P. (2008, November). Self-stabilizing leader election in optimal space. In Symposium on Self-Stabilizing Systems(pp. 109-123). Springer Berlin Heidelberg.
[6] Pattanayak, B. K., & Rath, M. (2014). A MOBILE AGENT BASED INTRUSION DETECTION SYSTEM ARCHITECTURE FOR MOBILE AD HOC NETWORKS. Journal of Computer Science, 10(6), 970.
[7] Abosamra, A., Hashem, M., & Darwish, G. (2011). Securing DSR with mobile agents in wireless ad hoc networks. Egyptian Informatics Journal, 12(1), 29-36.
[8] Chowdhury, C., & Neogy, S. (2011). Securing Mobile Agents in MANET against attacks using Trust. International Journal of Network Security & Its Applications, 3(6), 259.
[9] Lakshmi, R. P., & Kumar, A. V. A. (2013). Mobile agent based clustering and maintenance using secure routing protocol for mobile ad hoc network
.International Journal of Physical Sciences, 8(17), 793-802.
[10] PushpaLakshmi, R., Kumar, A. V. A., & Rahul, R. (2011, March). Mobile agent based composite key management scheme for MANET. In Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference on (pp. 964-969). IEEE.
[11] Halim, I. T. A., Fahmy, H. M., El-Din, A. M. B., & El-Shafey, M. H. (2010, September). Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. In 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM) (pp. 1-8). IEEE.
Comment citer
MAQBOL, AHMED; KAZAR, OKBA. SPMA-NETS: SECURITY PROTOCOL BASED MOBILE AGENT IN MANETS. Courrier du Savoir, [S.l.], v. 22, fév. 2017. ISSN 1112-3338. Disponible à l'adresse : >http://revues.univ-biskra.dz/index.php/cds/article/view/1915>. Date de consultation : 10 jui. 2020