Mobile agents security protocols


Autoria(s): Al-jaljouli, Raja; Abawajy, Jemal
Contribuinte(s)

Kumar, A.V. Senthil

Rahman, Hakikur

Data(s)

01/01/2012

Resumo

Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.

Identificador

http://hdl.handle.net/10536/DRO/DU:30043180

Idioma(s)

eng

Publicador

Information Science Reference

Relação

http://dro.deakin.edu.au/eserv/DU:30043180/aljaljouli-mobileagent-evidence-2012.pdf

http://dro.deakin.edu.au/eserv/DU:30043180/aljaljouli-mobileagentssecurity-2012.pdf

http://dx.doi.org/10.4018/978-1-4666-0080-5.ch010

Direitos

2012, IGI Global

Palavras-Chave #mobile agent #security #security protocol
Tipo

Book Chapter