File(s) under permanent embargo
Security framework for mobile agents-based applications
Mobile agents have been proposed for key applications such as forensics analysis, intrusion detection, e-commerce, and resource management. Yet, they are vulnerable to various security threats by malicious hosts or intruders. Conversely, genuine platforms may run malicious agents. It is essential to establish a truly secure framework for mobile agents to gain trust of clients in the system. Failure to accomplish a trustworthy secured framework for Mobile Agent System (MAS) will limit their deployment into the key applications. This chapter presents a comprehensive taxonomy of various security threats to Mobile Agent System and the existing implemented security mechanisms. Different mechanisms are discussed, and the related security deficiencies are highlighted. The various security properties of the agent and the agent platform are described. The chapter also introduces the properties, advantages, and roles of agents in various applications. It describes the infrastructure of the system and discusses several mobile agent frameworks and the accomplished security level.
History
Title of book
Mobile computing techniques in emerging markets : systems, applications and servicesChapter number
9Pagination
242 - 269Publisher
Information Science ReferencePlace of publication
Hershey Pa.ISBN-13
9781466600829ISBN-10
1466600829Language
engPublication classification
B1 Book chapterCopyright notice
2012, IGI GlobalExtent
11Editor/Contributor(s)
A Kumar, H RahmanUsage metrics
Categories
No categories selectedLicence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC