Deakin University
Browse

Mobile Agents Security Protocols

chapter
posted on 2014-01-01, 00:00 authored by R Al-Jaljuli, Jemal AbawajyJemal Abawajy
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.

History

Alternative title

Mobile Agents Security Protocols

Chapter number

7

Pagination

166-202

ISBN-13

9781466647077

ISBN-10

1466647078

Publication classification

B Book chapter, B2 Book chapter in non-commercially published book

Copyright notice

2014, IGI Global

Editor/Contributor(s)

Al-Jaljuli R, Abawajy J

Publisher

IGI Global

Place of publication

USA

Title of book

Crisis Management: Concepts, Methodologies, Tools, and Applications

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC