Deakin University
Browse

File(s) under permanent embargo

Mobile agents security protocols

chapter
posted on 2012-01-01, 00:00 authored by Raja Al-Jaljouli, Jemal AbawajyJemal Abawajy
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.

History

Title of book

Mobile computing techniques in emerging markets : systems, applications and services

Chapter number

10

Pagination

270 - 305

Publisher

Information Science Reference

Place of publication

Hershey, Pa.

ISBN-13

9781466600829

ISBN-10

1466600829

Language

eng

Publication classification

B1 Book chapter

Copyright notice

2012, IGI Global

Extent

11

Editor/Contributor(s)

A Kumar, H Rahman

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC