Wireless Network Security: The Mobile Agent Approach
نویسندگان
چکیده
منابع مشابه
A New Approach for Mobile Agent Security
A mobile agent is a software which performs an action autonomously and independently as a person or an organizations assistance. Mobile agents are used for searching information, retrieval information, filtering, intruder recognition in networks, and so on. One of the important issues of mobile agent is their security. It must consider different security issues in effective and secured usage of...
متن کاملSecuring Wireless Ad Hoc Networks:Towards A Mobile Agent Security Architecture
Achieving secure communication is especially challenging in wireless ad hoc networks, where no infrastructure or central authority exists, and the state and topology of the network is dynamic and fault-prone. These unique characteristics of wireless ad hoc networks make traditional cryptographic mechanisms and assumptions inappropriate. In this paper, we propose mobile agents as a solution to t...
متن کاملMobile Agent Security
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However, it has not become popular due to some problems such as security. Threats to mobile agent security generally fall into three main classes: disclosure of information, denial of service, and corruption of information. Four threat categories are identified: threats stem...
متن کاملMobile agent security
The agent paradigm is currently attracting much research. A mobile agent is a particular type of agent with the ability to migrate from one host to another where it can resume its execution. In this article we consider security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be a viable solution for a broad range of commercial applica...
متن کاملWireless Mobile Security
This paper offers an overview of the current threats to mobile system data confidentiality, availability and integrity. It will present the data-centric security model as a key enabler for secure personal and business use of mobile devices. Finally, the incident handling model will be applied against mobile device security events in order to assess the model against this relatively new threat v...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communications, Network and System Sciences
سال: 2013
ISSN: 1913-3715,1913-3723
DOI: 10.4236/ijcns.2013.610046