Reference Hub1
Security Framework for Mobile Agents-Based Applications

Security Framework for Mobile Agents-Based Applications

Raja Al-Jaljouli, Jemal H. Abawajy
ISBN13: 9781466600805|ISBN10: 1466600802|EISBN13: 9781466600812
DOI: 10.4018/978-1-4666-0080-5.ch009
Cite Chapter Cite Chapter

MLA

Al-Jaljouli, Raja, and Jemal H. Abawajy. "Security Framework for Mobile Agents-Based Applications." Mobile Computing Techniques in Emerging Markets: Systems, Applications and Services, edited by A.V. Senthil Kumar and Hakikur Rahman, IGI Global, 2012, pp. 242-269. https://doi.org/10.4018/978-1-4666-0080-5.ch009

APA

Al-Jaljouli, R. & Abawajy, J. H. (2012). Security Framework for Mobile Agents-Based Applications. In A. Kumar & H. Rahman (Eds.), Mobile Computing Techniques in Emerging Markets: Systems, Applications and Services (pp. 242-269). IGI Global. https://doi.org/10.4018/978-1-4666-0080-5.ch009

Chicago

Al-Jaljouli, Raja, and Jemal H. Abawajy. "Security Framework for Mobile Agents-Based Applications." In Mobile Computing Techniques in Emerging Markets: Systems, Applications and Services, edited by A.V. Senthil Kumar and Hakikur Rahman, 242-269. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0080-5.ch009

Export Reference

Mendeley
Favorite

Abstract

Mobile agents have been proposed for key applications such as forensics analysis, intrusion detection, e-commerce, and resource management. Yet, they are vulnerable to various security threats by malicious hosts or intruders. Conversely, genuine platforms may run malicious agents. It is essential to establish a truly secure framework for mobile agents to gain trust of clients in the system. Failure to accomplish a trustworthy secured framework for Mobile Agent System (MAS) will limit their deployment into the key applications. This chapter presents a comprehensive taxonomy of various security threats to Mobile Agent System and the existing implemented security mechanisms. Different mechanisms are discussed, and the related security deficiencies are highlighted. The various security properties of the agent and the agent platform are described. The chapter also introduces the properties, advantages, and roles of agents in various applications. It describes the infrastructure of the system and discusses several mobile agent frameworks and the accomplished security level.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.