基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.
推荐文章
Diffusion in garnet: a review
High temperature and high pressure
Diffusion
Garnet
Point defects
基于WS-security的数据安全交换
端到端
WS-Security
SOAP消息
令牌
基于SOAP协议的Web Service 安全基础规范(WS-Security)
Web Service
WS-Security
安全规范
安全信息交换
SOAP协议扩展
Windows Mobile电源管理分析与实现
WindowsMobile
电源管理
PXA270
功耗
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 Classification and Review of Security Schemes in Mobile Computing
来源期刊 无线传感网络(英文) 学科 工学
关键词 WIRELESS SENSOR Networks BETA TRUST Model TRUST ROUTING PROTOCOL Network Security TRUST Evaluation
年,卷(期) 2010,(6) 所属期刊栏目
研究方向 页码范围 419-440
页数 22页 分类号 TP39
字数 语种
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (0)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2010(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
研究主题发展历程
节点文献
WIRELESS
SENSOR
Networks
BETA
TRUST
Model
TRUST
ROUTING
PROTOCOL
Network
Security
TRUST
Evaluation
研究起点
研究来源
研究分支
研究去脉
引文网络交叉学科
相关学者/机构
期刊影响力
无线传感网络(英文)
月刊
1945-3078
武汉市江夏区汤逊湖北路38号光谷总部空间
出版文献量(篇)
358
总下载数(次)
0
总被引数(次)
0
论文1v1指导