Mobile-Based DoS Attack Security Agent in Sensor Networking
详细信息    查看全文
  • 作者:Donghyun Kim ; Sungmo Jung ; Dae-Joon Hwang ; Seoksoo Kim
  • 关键词:Machine ; to ; machine ; Mobile devices ; Security agent ; Sensor networking ; Service provisioning
  • 刊名:Wireless Personal Communications
  • 出版年:2016
  • 出版时间:January 2016
  • 年:2016
  • 卷:86
  • 期:1
  • 页码:91-107
  • 全文大小:1,200 KB
  • 参考文献:1.Stanoevaska-Slabeva, K., & Wozniak, T. (2010). Grid and cloud computing鈥擜 business perspective on technology and applications. Berlin, Heidelberg: Springer.CrossRef
    2.Kim, W. (2009). Cloud computing: Today and tomorrow. Journal of Object Technology, 8, 65鈥?2.CrossRef
    3.Yee, B. (1999). A sanctuary for mobile agents. In J. Vitek & C. Jensen (Eds.), Secure internet programming (Vol. 1603, pp. 261鈥?74). Berlin: LNCS Springer.CrossRef
    4.Siebenlist, F. (2009). Challenges and opportunities for virtualized security in the clouds. In SACMAT 鈥?9: Proceedings of the 14th ACM symposium on access control models and technologies. New York, NY: ACM, pp. 1鈥?.
    5.Cachin, C., Keidar, I., & Shraer, A. (2009). Trusting the cloud. SIGACT News, 40, 81鈥?6.CrossRef
    6.Enisa. (2009). Cloud computing risk assessment. http://鈥媤ww.鈥媏nisa.鈥媏uropa.鈥媏u/鈥媋ct/鈥媟m/鈥媐iles/鈥媎eliverables
    7.Kim, G., & Spafford, E. (1994). 鈥淒esign and implementation of tripwire: A file system integrity checker鈥? Purdue technical report CSD-TR-93-071. West Lafayette: Coast Laboratory, Department of Computer Sciences, Purdue University.CrossRef
    8.AIDE Team. (2005). Advanced intrusion detection environment. http://鈥媠ourceforge.鈥媙et/鈥媝rojects/鈥媋ide
    9.Harrison, C., & Chess, D. (1995). Mobile agents: Are they good? IBM Research Report.
    10.Peine, H., & Stolpmann, T. (1997). The architecture of the Ara platform for mobile agents. In Proceedings of the first international workshop on mobile agents MA鈥?7, LNCS no. 1219.
    11.Straber, M., Baumann, M., & Mole, J. (1996). A Java based mobile agent system. In Proceedings of the ECOOP 鈥?6 workshop on mobile object systems.
    12.Farmer, W., Gutmann, J., & Swarup, V. (1996). Security for mobile agents: Issues and requirements. In Proceedings of the 19th national information systems security conference.
    13.Rajkumar, B., Yeo, C., Venugopal, S., & Malpani, S. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems.
    14.Aulbach, S., Grust, T., Jacobs, D., Kemper, A., & Rittinger, J. (2008). Multi-tenant databases for software as service: schema-mapping techniques. In Proceedings of the 2008 ACM SIGMOD international conference on management of data, pp. 1195鈥?206.
    15.Alford, T., & Morton, G. (2009). The Economics of cloud computing. McLean: Booz Allen Hamilton.
    16.Massaguer, D. (2005). Multi mobile agent deployment in wireless sensor networks. Master鈥檚 thesis, University of California.
    17.Lipson, H. (2002). Tracking and tracing cyber-attacks: Technical challenges and global policy issues. SPECIAL REPORT CMU/SEI-2002-SR-009.
    18.Neuman, B., & Tso, T. (1994). An authentication service for computer networks. IEEE Communications Magazine 32, pp. 33鈥?8.
    19.Hu, W. (1995). DCE security programming. ISBN 1-56592-134-8, O鈥橰eilly & Associates.
    20.Krishnamachari, B., Estrin, D., & Wicker, S. (2002). Impact of data aggregation in wireless sensor networks. In Proceedings of IEEE INFOCOM, pp. 575鈥?78.
  • 作者单位:Donghyun Kim (1)
    Sungmo Jung (1)
    Dae-Joon Hwang (2)
    Seoksoo Kim (1)

    1. Department of Multimedia, Hannam University, Daejoen, Korea
    2. Information and Communication Engineering, Sungkyunkwon University, Suwon, Korea
  • 刊物类别:Engineering
  • 刊物主题:Electronic and Computer Engineering
    Signal,Image and Speech Processing
    Processor Architectures
  • 出版者:Springer Netherlands
  • ISSN:1572-834X
文摘
Cloud computing emerges as a way to dynamically increase the capacity or capabilities in infrastructure architectures, software delivery, and development models. However, security is one of the major issues with mobile applications as they can be attacked by malicious users which reduces the growth of cloud computing and complications with data privacy and data protection. In this paper, a mobile-based security agent is presented which provides security mechanisms to security agents as well as hosts. This type of security agent is significant in providing security mechanism to security risks in cloud computing due to its ability to migrate from one host to another where it can resume its processing and service provisioning. Additionally, some of the current attacks are created that attackers may initiate. A fault tolerance at a high level was enabled for mobile-based distributed transaction processing in the cloud. The results show that most of the attack messages were detected and identified, and the type of attack was identified within a specific period of time. Keywords Machine-to-machine Mobile devices Security agent Sensor networking Service provisioning

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700