Mobile Computing : Security Threats

Authors(2) :-Sweety, Jabir Singh

This paper deals with the security issues and different security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are permeative, present anywhere at once and without any centralized authority. These unique characteristics will increasing security threats, demand solutions in securing ad hoc networks. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.

Authors and Affiliations

Sweety
Computer Science and Engineering, Shanti Niketan College , Hisar, Haryana, India
Jabir Singh
Computer Science and Engineering, Shanti Niketan College , Hisar, Haryana, India

Mobile Ad-hoc network, mobile agent model, network security.

  1. Hu, D. B. Johnson and A. Perrig, "SEAD: Secure Effi-cient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proceedings of 4th IEEE Workshop on Mobile Computing Systems & Applications, New York, 2002, pp. 3-13.
  2. Reiser and G. Vogt, "Security Requirements for Man-agement Systems Using Mobile Agents," Proceedings of the 5th IEEE Symposium on Computers and Communica-tions, Antibes-Juan Les Pins, 2000, pp. 160-165.
  3. Fugetto, G. P. Pivvo and G. Vigna, "Understanding Code Mobility" IEEE Transactions on Software Engi-neering, Vol. 24, No. 5, 1998, pp. 342-361.
  4. Johansen, R. V. Renessee and F. B. Schneider, "An Introduction to the TACOMA Distributed System-Version 1.0," Technical Report, Department of Computer Science, University of Tromso and Cornell University, 1995.

Publication Details

Published in : Volume 2 | Issue 5 | September-October 2016
Date of Publication : 2016-10-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 160-162
Manuscript Number : IJSRSET162541
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Sweety, Jabir Singh, " Mobile Computing : Security Threats, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 5, pp.160-162, September-October.2016
URL : http://ijsrset.com/IJSRSET162541

Follow Us

Contact Us