Deakin University
Browse

File(s) under permanent embargo

Security framework for mobile agents-based applications

chapter
posted on 2012-01-01, 00:00 authored by Raja Al-Jaljouli, Jemal AbawajyJemal Abawajy
Mobile agents have been proposed for key applications such as forensics analysis, intrusion detection, e-commerce, and resource management. Yet, they are vulnerable to various security threats by malicious hosts or intruders. Conversely, genuine platforms may run malicious agents. It is essential to establish a truly secure framework for mobile agents to gain trust of clients in the system. Failure to accomplish a trustworthy secured framework for Mobile Agent System (MAS) will limit their deployment into the key applications. This chapter presents a comprehensive taxonomy of various security threats to Mobile Agent System and the existing implemented security mechanisms. Different mechanisms are discussed, and the related security deficiencies are highlighted. The various security properties of the agent and the agent platform are described. The chapter also introduces the properties, advantages, and roles of agents in various applications. It describes the infrastructure of the system and discusses several mobile agent frameworks and the accomplished security level.

History

Title of book

Mobile computing techniques in emerging markets : systems, applications and services

Chapter number

9

Pagination

242 - 269

Publisher

Information Science Reference

Place of publication

Hershey Pa.

ISBN-13

9781466600829

ISBN-10

1466600829

Language

eng

Publication classification

B1 Book chapter

Copyright notice

2012, IGI Global

Extent

11

Editor/Contributor(s)

A Kumar, H Rahman

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC