The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Freezing Mode oriented to Mobile Agent transport is provided for network applications that require high level security. This is achieved by multiple verification and frozen sensitive data and code. All these ensure that the network applications are safe even if Mobile Agents are intercepted during its transport.
Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many mission and life-critical applications. However, the broadcast nature of inter-node communications and node mobility in MANETs make it very challenging to secure MANETs. Moreover, their constantly changing topology causes network node density and neighbor relationships to change dynamically. This paper...
Sinkhole attacks are particularly harmful against routing in wireless sensor networks in which the intruder attempts to lure all traffic towards itself, with false routing information. It gives serious damage to the network load balancing, as well as other types of attacks to provide a platform. So it is very important to prevent and detect this type of attack. In this paper, we present a secure routing...
In mobile ad hoc networks the nodes are dynamically changing and they have a fully decentralized topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmissions medium. We proposed a novel agent based framework to monitor, detect, and isolate misbehaving nodes in...
This work presents a new mechanism for securing mobile ad hoc domain. Some human immune features and properties have been motivated in an attempt to build a robust security system. New computational techniques have been developed based on the immune system concepts, seeking to solve several engineering problems; however, not all the previous approaches have a tangible contribution to the networking...
We consider the problem of keeping sensitive data and algorithms contained in a mobile agent from discovery and exploitation by a malicious host. The paper illustrates a novel distributed protocol for multi agent environments to improve the communication security in packet-switched networks. To enrich the overall system security the approach makes use of distribution and double encryption and some...
Trust management techniques must be adapted to the unique needs of the system architectures and problem domains to which they are applied. Certain characteristics of swarms, such as their lightweight, ephemeral nature and indirect communication, make this adaptation especially challenging. In this paper we look at the trust issues and opportunities in swarm-based autonomic computing systems and find...
Due to the inherent characteristics of the ad hoc network, the traditional intrusion detection technology (IDS) can not function effectively in the ad hoc network. We apply the idea of systems analysis and integration to constructing the IDS model. And by doing so, we produce an intrusion detection system model for ad hoc networks, which is with a local character repository and only apply distributed...
Mobile ad hoc networks (MANET) is a dynamic wireless self-organizing networks. Owing to MANET take the characteristic of dynamic structure and wireless communication, it is much easy to suffer security threats. Fault-tolerance method allow system failure, it make the system continue to calculate effectively in the inaccurate case. Owing to the autonomy peculiarity of mobile agent, nobody natural entity...
We propose a secure route optimization mechanism for network mobility management. We also solve three problems to achieve the route optimization: Mobile Router's security association, need of Correspondent Node's Mobile IPv6-awareness, and location privacy. In order to solve the problems, we make a Mobile Router a secure proxy of a mobile network node so that the mobile router can send a proxy binding...
Security is an important issue for the widespread deployment of applications based on software agent technology. Group signature is integrated into secure routing protocol for mobile agents in this paper. The hosts visited by mobile agent are in different groups. The structure of group oriented routing protocol is more clear and nature. Besides, by building trust policies, the risk and loss of DoS...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Security has been the key barrier to the extensive deployment of mobile agent (MA) technologies. In a mobile agent system (MAS), there are a variety of security issues, one of which is security issue in data communications. This paper proposes a method for assuring the security of data transmission in communications after analyzing the security threats in the communications for MAs. Utilizing some...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.