Skip to main content
Log in

Mobile-Based DoS Attack Security Agent in Sensor Networking

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cloud computing emerges as a way to dynamically increase the capacity or capabilities in infrastructure architectures, software delivery, and development models. However, security is one of the major issues with mobile applications as they can be attacked by malicious users which reduces the growth of cloud computing and complications with data privacy and data protection. In this paper, a mobile-based security agent is presented which provides security mechanisms to security agents as well as hosts. This type of security agent is significant in providing security mechanism to security risks in cloud computing due to its ability to migrate from one host to another where it can resume its processing and service provisioning. Additionally, some of the current attacks are created that attackers may initiate. A fault tolerance at a high level was enabled for mobile-based distributed transaction processing in the cloud. The results show that most of the attack messages were detected and identified, and the type of attack was identified within a specific period of time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Stanoevaska-Slabeva, K., & Wozniak, T. (2010). Grid and cloud computing—A business perspective on technology and applications. Berlin, Heidelberg: Springer.

    Book  Google Scholar 

  2. Kim, W. (2009). Cloud computing: Today and tomorrow. Journal of Object Technology, 8, 65–72.

    Article  Google Scholar 

  3. Yee, B. (1999). A sanctuary for mobile agents. In J. Vitek & C. Jensen (Eds.), Secure internet programming (Vol. 1603, pp. 261–274). Berlin: LNCS Springer.

    Chapter  Google Scholar 

  4. Siebenlist, F. (2009). Challenges and opportunities for virtualized security in the clouds. In SACMAT ’09: Proceedings of the 14th ACM symposium on access control models and technologies. New York, NY: ACM, pp. 1–2.

  5. Cachin, C., Keidar, I., & Shraer, A. (2009). Trusting the cloud. SIGACT News, 40, 81–86.

    Article  Google Scholar 

  6. Enisa. (2009). Cloud computing risk assessment. http://www.enisa.europa.eu/act/rm/files/deliverables

  7. Kim, G., & Spafford, E. (1994). “Design and implementation of tripwire: A file system integrity checker”, Purdue technical report CSD-TR-93-071. West Lafayette: Coast Laboratory, Department of Computer Sciences, Purdue University.

    Book  Google Scholar 

  8. AIDE Team. (2005). Advanced intrusion detection environment. http://sourceforge.net/projects/aide

  9. Harrison, C., & Chess, D. (1995). Mobile agents: Are they good? IBM Research Report.

  10. Peine, H., & Stolpmann, T. (1997). The architecture of the Ara platform for mobile agents. In Proceedings of the first international workshop on mobile agents MA’97, LNCS no. 1219.

  11. Straber, M., Baumann, M., & Mole, J. (1996). A Java based mobile agent system. In Proceedings of the ECOOP ’96 workshop on mobile object systems.

  12. Farmer, W., Gutmann, J., & Swarup, V. (1996). Security for mobile agents: Issues and requirements. In Proceedings of the 19th national information systems security conference.

  13. Rajkumar, B., Yeo, C., Venugopal, S., & Malpani, S. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems.

  14. Aulbach, S., Grust, T., Jacobs, D., Kemper, A., & Rittinger, J. (2008). Multi-tenant databases for software as service: schema-mapping techniques. In Proceedings of the 2008 ACM SIGMOD international conference on management of data, pp. 1195–1206.

  15. Alford, T., & Morton, G. (2009). The Economics of cloud computing. McLean: Booz Allen Hamilton.

    Google Scholar 

  16. Massaguer, D. (2005). Multi mobile agent deployment in wireless sensor networks. Master’s thesis, University of California.

  17. Lipson, H. (2002). Tracking and tracing cyber-attacks: Technical challenges and global policy issues. SPECIAL REPORT CMU/SEI-2002-SR-009.

  18. Neuman, B., & Tso, T. (1994). An authentication service for computer networks. IEEE Communications Magazine 32, pp. 33–38.

  19. Hu, W. (1995). DCE security programming. ISBN 1-56592-134-8, O’Reilly & Associates.

  20. Krishnamachari, B., Estrin, D., & Wicker, S. (2002). Impact of data aggregation in wireless sensor networks. In Proceedings of IEEE INFOCOM, pp. 575–578.

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A2006026).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seoksoo Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, D., Jung, S., Hwang, DJ. et al. Mobile-Based DoS Attack Security Agent in Sensor Networking. Wireless Pers Commun 86, 91–107 (2016). https://doi.org/10.1007/s11277-015-3098-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-3098-3

Keywords

Navigation