Classification and Review of Security Schemes in Mobile Computing

Sathish A. P. Kumar
{"title":"Classification and Review of Security Schemes in Mobile Computing","authors":"Sathish A. P. Kumar","doi":"10.4236/wsn.2010.26054","DOIUrl":null,"url":null,"abstract":"In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wirel. Sens. Netw.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4236/wsn.2010.26054","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

Abstract

In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.
移动计算安全方案的分类与综述
本文对移动计算系统中的安全方案进行了分类和综述。我们根据移动计算系统——移动自组织网络(MANET)和移动代理模型中使用的基础设施类型对这些方案进行了分类。移动自组织网络无处不在,没有任何集中的权威。这些独特的特性,再加上不断增加的安全威胁,需要在部署到商业和军事应用之前,解决方案来保护自组织网络。本文综述了当前移动自组织网络的安全威胁、现有的解决方案、它们的局限性和有待研究的问题。我们还解释了入侵检测和响应技术作为保护基于MANET的移动计算系统及其方法的替代方法。对现有的入侵检测方法和入侵响应方法进行了综述。本文还介绍了现有的MANET入侵检测和响应方法的局限性,以及在提供MANET安全性方面的开放性研究问题。针对基于Mobile Agent的移动计算系统,给出了基于Mobile Agent模型的各种类型的安全攻击的分类,并给出了各种方案针对这些类型的攻击提出的安全解决方案,以及为基于Mobile Agent的移动计算系统提供安全方面的开放性研究问题。这样的分类有助加深对流动计算系统内建议的保安方案的了解,有助日后发展和加强保安方案,并有助在实施流动计算系统时选择适当的方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信