Most security policies of wireless ad-hoc networks prohibit the system administrator to use a wireless channel to admin the system. The same holds for administrating firewall and proxy servers. On the other hand, personal mobile device is becoming one of the most important equipments canied permanently by its owner. This fact enables accommodating many personspecific authentications and applications in that device. The device includes moderate computation power as well as trusted security functions. The device security infrasttucture can allow implementing both a t a b l e and traceable applications.In this work we present a mechanism to enhance the security of administrating ad-hoc network by participating a secured mobile device identity in the authentication process. The proposed technique offers a wireless web tunneling, which permits the designated administrator to access the internal web services. The device, fmm which the administrator is performing his job, would be a part of the authentication process. In that case the authenticated device identity is jointly used with a secured administrator identity to enhance the security and tractability of sensitive administration operations. The proposal introduces implicitly, and in general, a framework for a mobile device assisted authentication.
In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host. So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.