Secure Multi-Agent Integrated Password Management (MIPM) Application
Keywords:
AES encryption, multi-agent, Java Agent Development Environment, password management,Abstract
Rapid development of the Internet and increasing number of available Web applications require users to memorize the passwords for authentication. Password management system is a solution to store login information such as password and help users to log in automatically. In preventing from password leaking, this project was integrated with the multi-agents using Java Agent Development Environment (JADE). The purpose of the embedded agents is act as the third party software to ease the encryption process. The application agent sends data to Crypto Agent using Agent Communication Language (ACL) message, a method of communication between agents. Upon receiving, crypto agent encrypts the data using AES 128-bit encryption algorithm. AES will facilitate the process of the encryption and decryption, and withstand the application from the brute force attack. As whole, MIPM is a development on android application that provide secure platform to store their login account information such as their username, emails and passwords. While, the implementation of the multi-agent communication in this project can be expanded to be commercialize for any web applications development.References
Agrawal, M., & Mishra, P. (2012). A comparative survey on symmetric key encryption techniques. International Journal on Computer Science and Engineering (IJCSE), 4(05), 877-882.
Amato, A., Di Martino, B., & Venticinque, S. (2012, July). Semantically augmented exploitation of pervasive environments by intelligent agents. In Parallel and Distributed Processing with Applications (ISPA), 2012 IEEE 10th International Symposium on (pp. 807-814). IEEE.
Hariri, M., Aldhubaib, R., Qurashi, R. J., Khan, F. Q., Fazil, M. (2012). Fourth Annual Undergraduate Research Conference on Applied Computing (URC 2012).
Pahal, R., & Kumar, V. (2013). Efficient Implementation of AES. International Journal of Advanced Research in Computer Science and Software Engineering, 3(7), 290-295.
Saranya, K., Mohanapriya, R., & Udhayan, J. (2014). A Review on Symmetric Key Encryption Techniques in Cryptography. International Journal of Science, Engineering and Technology Research (IJSETR), 3(3), 539-544.
Singh, A., & Gilhotra, R. (2011). Data security using private key encryption system based on arithmetic coding. International Journal of Network Security & Its Applications (IJNSA), 3(3), 58-67.
CGI. (2004). Public Key Encryption and Digital Signature: How do they work? [White Paper]. CGI Group Inc.
Tripathi, R., & Agrawal, S. (2014). Comparative study of symmetric and asymmetric cryptography techniques. International Journal of Advance Foundation and Research in Computer (IJAFRC), 1(6), 68-76.
Zhou, X., & Tang, X. (2011). Research and implementation of RSA algorithm for encryption and decryption. International Forum on Strategic Technology (IFOST), 6(2), pp. 1118-1121.
Wooldridge, M. (2002). An Introduction to MultiAgent Systems. John Wiley & Sons. LTD
Parkin, S., Driss, S., Krol, K., & Sasse, M. A. (2015). Assessing the User Experience of Password Reset Policies in a University. In International Conference on Passwords (pp. 21-38). Springer International Publishing.
Downloads
Published
How to Cite
Issue
Section
License
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.