2017
DOI: 10.1145/3095797
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Agents System Security

Abstract: A pivotal cause for the boom of Mobile Agent paradigm relies on the competence to ward off security attacks. This article surveys the prevalent attacks on the mobile agents and the agent platforms; the existing countermeasures and their curbs, catering threefold benefaction: First, to acquaint the researchers with numerous security requirements and the objectives. Second, to analyze the different detection and prevention mechanisms mitigating the security bottlenecks in Mobile Agents System. Third, to address … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 169 publications
0
10
0
Order By: Relevance
“…The problem with the EKG-based technique is related to generalization, where it limits the execution of the visiting mobile agent to the conditions that must be satisfied on the DM side. In other words, it is unsuitable for certain applications since it may lead to the blocking of the execution of the visiting agent [28]. Furthermore, all the approaches mentioned above suffer from low resistance to advanced attacks, such as alternation attacks, collusion attacks, and denial of service (DoS) attacks, according to previous works [2,28].…”
Section: Statement Of Problemmentioning
confidence: 99%
See 3 more Smart Citations
“…The problem with the EKG-based technique is related to generalization, where it limits the execution of the visiting mobile agent to the conditions that must be satisfied on the DM side. In other words, it is unsuitable for certain applications since it may lead to the blocking of the execution of the visiting agent [28]. Furthermore, all the approaches mentioned above suffer from low resistance to advanced attacks, such as alternation attacks, collusion attacks, and denial of service (DoS) attacks, according to previous works [2,28].…”
Section: Statement Of Problemmentioning
confidence: 99%
“…In other words, it is unsuitable for certain applications since it may lead to the blocking of the execution of the visiting agent [28]. Furthermore, all the approaches mentioned above suffer from low resistance to advanced attacks, such as alternation attacks, collusion attacks, and denial of service (DoS) attacks, according to previous works [2,28]. Beyond that, from a security point of view, the whole protection mechanism should be performed on the HM side (user or agent owner side).…”
Section: Statement Of Problemmentioning
confidence: 99%
See 2 more Smart Citations
“…While writing this paper, many other survey papers such as [100][101][102] from different fields of study as well as different journals have been analyzed thoroughly to accustom the authors' art of showing up their works, which eventually emanates this literature work. The literature is categorized into following four distinct sub-areas attaining prominence from various research perspectives:…”
Section: Key Sub-areasmentioning
confidence: 99%