Abstract

In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.

Highlights

  • The wonderful invention of Internet offers access to information sources worldwide, we do not expect to benefit from that access until we arrive at some familiar point-whether home, office, or school

  • With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system

  • In this paper we have presented the taxonomy of security schemes for mobile computing systems

Read more

Summary

Introduction

The wonderful invention of Internet offers access to information sources worldwide, we do not expect to benefit from that access until we arrive at some familiar point-whether home, office, or school. Having the Internet available to us as we move will give us the tools to build new computing environments wherever we go This is especially convenient in a wireless LAN office environment, where the boundaries between attachment points are not sharp and are often invisible. A Personal Area Network (PAN) level firewall as envisioned for the generation wireless networks can protect only if the users are at home and not when the users are roaming [3] Even if such a firewall is provided, the communication would get fragmented by these ‘check points’ on the network, as each firewall needs maintenance of activities like log control, software update etc., creating unnecessary overhead. Harrison et al [4] identify security as a “severe concern” and regard it as the primary obstacle to adopting mobile systems

MANET and Security Attacks in MANET
Mobile Agent Model and Security Threats in Mobile Agent Model
Security Threats in Mobile Agent Based Model
Review of MANET Attack Prevention Security Schemes for Active attacks
Review of MANET Attack Prevention Security Schemes for Passive Attacks
Review of MANET Intrusion Detection Security Approaches
Review of MANET Intrusion Response Security Approaches
Security Approaches for Mobile Agent Attacked by Another Agent
Security Approaches for Mobile Agent Attacked by the Host
Security Approaches for Host Attacked by Mobile Agents
Limitations of the Existing Schemes and the Open Research Issues
Findings
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.