Mobile agents system security: A systematic survey

P Bagga, R Hans - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A pivotal cause for the boom of Mobile Agent paradigm relies on the competence to ward off
security attacks. This article surveys the prevalent attacks on the mobile agents and the …

[PDF][PDF] Towards a New Model to Secure IoT-based Smart Home Mobile Agents using Blockchain Technology.

BE Sabir, M Youssfi, O Bouattane… - … , Technology & Applied …, 2020 - researchgate.net
The Internet of Things (IoT) is becoming an indispensable part of the actual Internet and
continues to extend deeper into the daily lives of people, offering distributed and critical …

Self-reliant mobile code: a new direction of agent security

S Srivastava, GC Nandi - Journal of Network and Computer Applications, 2014 - Elsevier
The motivation for using mobile agent technology in the context of distributed application
stems from its various advantages like intelligence, mobility, communication ability and fault …

Efficient anomaly intrusion detection system in adhoc networks by mobile agents

A Esfandi - 2010 3rd International Conference on Computer …, 2010 - ieeexplore.ieee.org
Networks are protected using many firewalls and encryption software's. But many of them
are not sufficient and effective. Most intrusion detection systems for mobile ad hoc networks …

[PDF][PDF] A survey on mobile agent based intrusion detection system

S Srivastava, N Gupta, S Chturvedi… - … Symposium on Devices …, 2011 - tex-host.ru
Intrusion detection system (IDS) is the security mechanism that gathers and analyzes the
information to detect unwanted attempts of accessing and manipulating the user and system …

Securing mobile agent and its platform from passive attack of malicious mobile agents

MV Prem, S Swamynathan - IEEE-International Conference On …, 2012 - ieeexplore.ieee.org
The mobile agent has been seen as a promising distributed computing technology. The
mobility characteristic of mobile agent makes it to travel often in open network. In this …

Q-Learning Based Method to Secure Mobile Agents and Choose the Safest Path in a IoT Environment

BE Sabir, M Youssfi, O Bouattane… - International Journal of …, 2024 - koreascience.kr
Abstract The Internet of Things (IoT) is an emerging element that is becoming increasingly
indispensable to the Internet and shaping our current understanding of the future of the …

Mobile agent security against malicious hosts: A survey

T Chattopadhyay, G Prasad - SN Computer Science, 2022 - Springer
With the progression of technology comes the increase in data putting more pressure on
bandwidth and generating greater network traffic. Mobile agents can be used as a potential …

Mobile Technologies

S Geng, Y Tan, L Yang - Managing IoT and Mobile Technologies …, 2021 - taylorfrancis.com
In this digital era, mobile technologies are closely related to our daily lives and have become
facilitators in various aspects, including business management, social communication, and …

Enhanced mobile security using sim encryption

N Nassar, R Newhook, G Miller - … International Conference on …, 2014 - ieeexplore.ieee.org
Mobile security is a main topic of concern for the enterprise. Corporate data stored in
employees device post a potential security risk of getting lost, stolen or get accessed by …