Mobile Agent Communication, Security Concerns, and Approaches: An Insight into Different Kinds of Vulnerabilities a Mobile Agent Could Be Subjected to and Measures to Control Them

Mobile Agent Communication, Security Concerns, and Approaches: An Insight into Different Kinds of Vulnerabilities a Mobile Agent Could Be Subjected to and Measures to Control Them

Kamat Pooja, Gite Shilpa, Patil Shruti
Copyright: © 2017 |Pages: 12
ISBN13: 9781522521549|ISBN10: 1522521542|EISBN13: 9781522521556
DOI: 10.4018/978-1-5225-2154-9.ch020
Cite Chapter Cite Chapter

MLA

Pooja, Kamat, et al. "Mobile Agent Communication, Security Concerns, and Approaches: An Insight into Different Kinds of Vulnerabilities a Mobile Agent Could Be Subjected to and Measures to Control Them." Detecting and Mitigating Robotic Cyber Security Risks, edited by Raghavendra Kumar, et al., IGI Global, 2017, pp. 300-311. https://doi.org/10.4018/978-1-5225-2154-9.ch020

APA

Pooja, K., Shilpa, G., & Shruti, P. (2017). Mobile Agent Communication, Security Concerns, and Approaches: An Insight into Different Kinds of Vulnerabilities a Mobile Agent Could Be Subjected to and Measures to Control Them. In R. Kumar, P. Pattnaik, & P. Pandey (Eds.), Detecting and Mitigating Robotic Cyber Security Risks (pp. 300-311). IGI Global. https://doi.org/10.4018/978-1-5225-2154-9.ch020

Chicago

Pooja, Kamat, Gite Shilpa, and Patil Shruti. "Mobile Agent Communication, Security Concerns, and Approaches: An Insight into Different Kinds of Vulnerabilities a Mobile Agent Could Be Subjected to and Measures to Control Them." In Detecting and Mitigating Robotic Cyber Security Risks, edited by Raghavendra Kumar, Prasant Kumar Pattnaik, and Priyanka Pandey, 300-311. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-2154-9.ch020

Export Reference

Mendeley
Favorite

Abstract

Mobile Agent Systems model has attracted attention of various researchers and scholars all over the world due to a wide array of features it offers. The capability of mobile agent to hop independently from one network to another, carrying out various computational processes on remote network, enables them to operate in fixed and mobile networks more efficiently and robustly than typical client-server systems. However little attention is paid to the security management of the mobile agents due to which it is still not widely used in the industry domain. . In this chapter, the authors examine the various security issues in Mobile Agent systems and approaches used to overcome them.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.