Author
Listed:
- Araoye O. I.
- Adewale O.S.
- Alese B.K.
- Akinyede O. R.
Abstract
Mobile agent is gaining attention in the research community because of its potential to replace traditional client-Server application in computer network system. Mobile agent has the ability to migrate autonomously from one server to another server as specified in its itinerary in computer network. Areas where mobile agent profit includes network management, information retrieval and electronic commerce. Mobile agent can be delegated to carry out all stages that are involved in electronic commerce such as Product brokering, Merchant brokering, Negotiation and Purchase. However there are security vulnerability issues with mobile agent system such as the need to ensure confidentiality of information of the agent from malicious parties, integrity of the data of the agent and non-repudiation from parties involves in the transactions. Security measure by agent developers has been mobile cryptography. This research combines Elliptic curve cryptography (ECC) and Steganography known as crypto-steganography to secure its agent. The agent was developed using PHP 5.0, Javascript, HTML, Wampserver and MySQL. The system was tested on a local area network with six computer systems, one of the computers represent client and the other five as servers. Performance evaluation was carried out to test for execution time and workload effect on the system. The result was compared with the existing secured agent-based electronic commerce systems in term of response time. The result shows that the proposed security is faster than RSA but a little slower than ECC only. A trade off was observed between a more secured system and response time of the system.
Suggested Citation
Araoye O. I. & Adewale O.S. & Alese B.K. & Akinyede O. R., 2018.
"Developing a Secured Mobile-Agent-Based Electronic Commerce Using Crypto-Steganography,"
International Journal of Sciences, Office ijSciences, vol. 7(02), pages 82-88, February.
Handle:
RePEc:adm:journl:v:7:y:2018:i:2:p:82-88
DOI: 10.18483/ijSci.1550
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:adm:journl:v:7:y:2018:i:2:p:82-88. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Staff ijSciences (email available below). General contact details of provider: .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.