IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET162541                                                     

Mobile Computing : Security Threats


Sweety, Jabir Singh
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
This paper deals with the security issues and different security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are permeative, present anywhere at once and without any centralized authority. These unique characteristics will increasing security threats, demand solutions in securing ad hoc networks. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.

Sweety, Jabir Singh

Mobile Ad-hoc network, mobile agent model, network security.

  1. Hu, D. B. Johnson and A. Perrig, "SEAD: Secure Effi-cient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proceedings of 4th IEEE Workshop on Mobile Computing Systems & Applications, New York, 2002, pp. 3-13.
  2. Reiser and G. Vogt, "Security Requirements for Man-agement Systems Using Mobile Agents," Proceedings of the 5th IEEE Symposium on Computers and Communica-tions, Antibes-Juan Les Pins, 2000, pp. 160-165.
  3. Fugetto, G. P. Pivvo and G. Vigna, "Understanding Code Mobility" IEEE Transactions on Software Engi-neering, Vol. 24, No. 5, 1998, pp. 342-361.
  4. Johansen, R. V. Renessee and F. B. Schneider, "An Introduction to the TACOMA Distributed System-Version 1.0," Technical Report, Department of Computer Science, University of Tromso and Cornell University, 1995.

Publication Details

Published in : Volume 2 | Issue 5 | September-October - 2016
Date of Publication Print ISSN Online ISSN
2016-10-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
160-162 IJSRSET162541   Technoscience Academy

Cite This Article

Sweety, Jabir Singh, "Mobile Computing : Security Threats", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 5, pp.160-162, September-October-2016.
URL : http://ijsrset.com/IJSRSET162541.php