This paper gives an overview of mobile agents and their general architecture, and reviews inherent vulnerabilities of this technology and current approaches for ...
People also ask
What are the security threats to mobile agents?
What are the methods for protecting mobile agents?
Which of the following security guidelines shall be followed for mobile security?
What are the security design and performance issues in mobile agent systems?
The measures of security rely primarily on identifying and authenticating trusted parties, with whom to inter-operate and include the following aspects: issue ...
This report provides an overview of the range of threats facing the designers of agent platforms and the developers of agent-based applications.
2. Denial ofService. Mobile agents can launch denial of service attacks by consuming an excessive amount of the agent platform's computing ...
Jan 9, 2024 · This paper presents a security framework that adds security defenses to mobile agent platforms. The proposed security framework implements a standard security ...
4. Security techniques protecting Mobile Agents: There are two categories of mobile agent protection techniques: fault tolerance and encryption [1].
Mobile agents are identified as the future platform for distributed electronic services (F. Hohl). However, hosts visited by mobile agents can be malicious ...
Mobile-agent systems must address three security issues: pro- tecting an individual machine, protecting a group of machines, and pro- tecting an agent. In this ...
Mobile agent security issues include: authentication, identification, secure messaging, certification, resource control, non-repudiation, trusted third parties, ...
Two types of security are possible to protect servers from malfunctioning and hostile agents: physical and social. Physical security refers to building servers ...