Mobile Computing : Security Threats
Keywords:
Mobile Ad-hoc network, mobile agent model, network security.Abstract
This paper deals with the security issues and different security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are permeative, present anywhere at once and without any centralized authority. These unique characteristics will increasing security threats, demand solutions in securing ad hoc networks. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.
References
- Hu, D. B. Johnson and A. Perrig, "SEAD: Secure Effi-cient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proceedings of 4th IEEE Workshop on Mobile Computing Systems & Applications, New York, 2002, pp. 3-13.
- Reiser and G. Vogt, "Security Requirements for Man-agement Systems Using Mobile Agents," Proceedings of the 5th IEEE Symposium on Computers and Communica-tions, Antibes-Juan Les Pins, 2000, pp. 160-165.
- Fugetto, G. P. Pivvo and G. Vigna, "Understanding Code Mobility" IEEE Transactions on Software Engi-neering, Vol. 24, No. 5, 1998, pp. 342-361.
- Johansen, R. V. Renessee and F. B. Schneider, "An Introduction to the TACOMA Distributed System-Version 1.0," Technical Report, Department of Computer Science, University of Tromso and Cornell University, 1995.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.