Mechanisms and security architecture of agent based mobile system and its security services
نویسنده
چکیده
In this paper we specify a set of security services and architecture of agent which is based upon mobile system. The security services are mainly divide into three main classes which is named as security services for protection of execution platform, protecting agent using security services ,communication for security services. We also describe functionality of security and where functionality fits into architecture. For architecture we used different level of abstraction starting with highest level to lowest level. First level of abstraction involves with involved parties and their roles. Second level of abstraction involves device which ision involves with involved parties and their roles. Second level of abstraction involves device which is hardware component that uses wireless networking. It also include mobile terminals and non-mobile computers which are part of agent system. Third level of abstraction include agent execution environment. Fourth level of abstraction includes agent and how agent interact with its environment.
منابع مشابه
Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملAgent Server Architecture for the Ajanta Mobile-Agent System
This paper provides an overview of Ajanta, a Java-based mobile-agent system, and focuses in particular on the architecture of the agent server { the process which hosts agents and enables them to access resources, communicate, migrate etc. The agent server's main components include an agent execution environment, an agent transfer protocol, a resource access protocol, and an agent monitoring se...
متن کاملMobile Agent security using Proxy-agents and Trusted domains∗
Commercial or wide-network deployment of Mobile Agent Systems is not possible without satisfying security architecture. In this paper we propose architecture for secure Mobile Agent Systems, using Trusted Domains and Proxy agents. Existing approaches are based on security services at the level of an agent system, library or specific objects. Our concept uses proxy agents to enable transparent s...
متن کامل