Mobile agents security protocols

Al-jaljouli, Raja and Abawajy, Jemal 2012, Mobile agents security protocols, in Mobile computing techniques in emerging markets : systems, applications and services, Information Science Reference, Hershey, Pa., pp.270-305.

Attached Files
Name Description MIMEType Size Downloads

Title Mobile agents security protocols
Author(s) Al-jaljouli, Raja
Abawajy, Jemal
Title of book Mobile computing techniques in emerging markets : systems, applications and services
Editor(s) Kumar, A.V. Senthil
Rahman, Hakikur
Publication date 2012
Chapter number 10
Total chapters 11
Start page 270
End page 305
Total pages 36
Publisher Information Science Reference
Place of Publication Hershey, Pa.
Keyword(s) mobile agent
security
security protocol
Summary Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.
ISBN 1466600829
9781466600829
Language eng
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 890103 Mobile Data Networks and Services
HERDC Research category B1 Book chapter
Copyright notice ©2012, IGI Global
Persistent URL http://hdl.handle.net/10536/DRO/DU:30043180

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 78 Abstract Views, 10 File Downloads  -  Detailed Statistics
Created: Tue, 13 Mar 2012, 09:51:56 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.