Reference Hub1
Mobile Agents Security Protocols

Mobile Agents Security Protocols

Raja Al-Jaljouli, Jemal H. Abawajy
ISBN13: 9781466647077|ISBN10: 1466647078|EISBN13: 9781466647084
DOI: 10.4018/978-1-4666-4707-7.ch007
Cite Chapter Cite Chapter

MLA

Al-Jaljouli, Raja, and Jemal H. Abawajy. "Mobile Agents Security Protocols." Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2014, pp. 166-202. https://doi.org/10.4018/978-1-4666-4707-7.ch007

APA

Al-Jaljouli, R. & Abawajy, J. H. (2014). Mobile Agents Security Protocols. In I. Management Association (Ed.), Crisis Management: Concepts, Methodologies, Tools, and Applications (pp. 166-202). IGI Global. https://doi.org/10.4018/978-1-4666-4707-7.ch007

Chicago

Al-Jaljouli, Raja, and Jemal H. Abawajy. "Mobile Agents Security Protocols." In Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 166-202. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4707-7.ch007

Export Reference

Mendeley
Favorite

Abstract

Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.