Mobile-Based DoS Attack Security Agent in Sensor Networking

被引:5
|
作者
Kim, Donghyun [1 ]
Jung, Sungmo [1 ]
Hwang, Dae-Joon [2 ]
Kim, Seoksoo [1 ]
机构
[1] Hannam Univ, Dept Multimedia, Taejon, South Korea
[2] Sungkyunkwan Univ, Informat & Commun Engn, Suwon, South Korea
基金
新加坡国家研究基金会;
关键词
Machine-to-machine; Mobile devices; Security agent; Sensor networking; Service provisioning;
D O I
10.1007/s11277-015-3098-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud computing emerges as a way to dynamically increase the capacity or capabilities in infrastructure architectures, software delivery, and development models. However, security is one of the major issues with mobile applications as they can be attacked by malicious users which reduces the growth of cloud computing and complications with data privacy and data protection. In this paper, a mobile-based security agent is presented which provides security mechanisms to security agents as well as hosts. This type of security agent is significant in providing security mechanism to security risks in cloud computing due to its ability to migrate from one host to another where it can resume its processing and service provisioning. Additionally, some of the current attacks are created that attackers may initiate. A fault tolerance at a high level was enabled for mobile-based distributed transaction processing in the cloud. The results show that most of the attack messages were detected and identified, and the type of attack was identified within a specific period of time.
引用
收藏
页码:91 / 107
页数:17
相关论文
共 50 条
  • [31] DoS attack prevention technique in Wireless Sensor Networks
    Patil, Shital
    Chaudhari, Sangita
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 715 - 721
  • [32] Mobile Agent Security Based on Trust Model in MANET
    Chowdhury, Chandreyee
    Neogy, Sarmistha
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 129 - 140
  • [33] A security architecture for agent-based mobile systems
    Borselius, N
    Hur, N
    Kaprynski, M
    Mitchell, CJ
    [J]. THIRD INTERNATIONAL CONFERENCE ON 3G MOBILE COMMUNICATION TECHNOLOGIES, 2002, (489): : 312 - 318
  • [34] SECURITY OF MOBILE AGENT-BASED WEB APPLICATIONS
    Ou, Chung-Ming
    Ou, C. R.
    Wang, Yao-Tien
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 107 - +
  • [35] MAST - A mobile agent-based security tool
    Carvalho, M
    Cowin, T
    Suri, N
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: COMMUNICATION, NETWORK AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS: II, 2003, : 317 - 323
  • [36] Security scheme for service composition based on mobile agent
    Shi, Yang
    Lin, Jie
    [J]. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2009, 15 (02): : 377 - 382
  • [37] Security schemes for protecting mobile agent based networks
    Tsaur, WJ
    Ho, CH
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 129 - 134
  • [38] Mobile agent security based on trust model in MANET
    Dept. of Computer Science and Engineering, Jadavpur University, India
    [J]. Commun. Comput. Info. Sci., PART 1 (129-140):
  • [39] Communication Security Research Based on Mobile Agent System
    Guan, Huanmei
    Zhang, Jingwei
    Liu, Jun
    Wang, Juan
    [J]. SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III: UNLOCKING THE FULL POTENTIAL OF GLOBAL TECHNOLOGY, 2008, : 204 - 207
  • [40] A security based model for mobile agent software systems
    Xu, HP
    Zhang, ZG
    Shatz, SM
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2005, 15 (04) : 719 - 746