Mobile agents security protocols

Al-jaljouli, Raja and Abawajy, Jemal 2012, Mobile agents security protocols. In Kumar, A.V. Senthil and Rahman, Hakikur (ed), Mobile computing techniques in emerging markets : systems, applications and services, Information Science Reference, Hershey, Pa., pp.270-305, doi: 10.4018/978-1-4666-0080-5.ch010.

Attached Files
Name Description MIMEType Size Downloads

Title Mobile agents security protocols
Author(s) Al-jaljouli, Raja
Abawajy, JemalORCID iD for Abawajy, Jemal
Title of book Mobile computing techniques in emerging markets : systems, applications and services
Editor(s) Kumar, A.V. Senthil
Rahman, Hakikur
Publication date 2012
Chapter number 10
Total chapters 11
Start page 270
End page 305
Total pages 36
Publisher Information Science Reference
Place of Publication Hershey, Pa.
Keyword(s) mobile agent
security protocol
Summary Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.
ISBN 1466600829
Language eng
DOI 10.4018/978-1-4666-0080-5.ch010
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 890103 Mobile Data Networks and Services
HERDC Research category B1 Book chapter
Copyright notice ©2012, IGI Global
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 642 Abstract Views, 15 File Downloads  -  Detailed Statistics
Created: Tue, 13 Mar 2012, 09:51:56 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact