Abstract
Cloud computing emerges as a way to dynamically increase the capacity or capabilities in infrastructure architectures, software delivery, and development models. However, security is one of the major issues with mobile applications as they can be attacked by malicious users which reduces the growth of cloud computing and complications with data privacy and data protection. In this paper, a mobile-based security agent is presented which provides security mechanisms to security agents as well as hosts. This type of security agent is significant in providing security mechanism to security risks in cloud computing due to its ability to migrate from one host to another where it can resume its processing and service provisioning. Additionally, some of the current attacks are created that attackers may initiate. A fault tolerance at a high level was enabled for mobile-based distributed transaction processing in the cloud. The results show that most of the attack messages were detected and identified, and the type of attack was identified within a specific period of time.
Similar content being viewed by others
References
Stanoevaska-Slabeva, K., & Wozniak, T. (2010). Grid and cloud computing—A business perspective on technology and applications. Berlin, Heidelberg: Springer.
Kim, W. (2009). Cloud computing: Today and tomorrow. Journal of Object Technology, 8, 65–72.
Yee, B. (1999). A sanctuary for mobile agents. In J. Vitek & C. Jensen (Eds.), Secure internet programming (Vol. 1603, pp. 261–274). Berlin: LNCS Springer.
Siebenlist, F. (2009). Challenges and opportunities for virtualized security in the clouds. In SACMAT ’09: Proceedings of the 14th ACM symposium on access control models and technologies. New York, NY: ACM, pp. 1–2.
Cachin, C., Keidar, I., & Shraer, A. (2009). Trusting the cloud. SIGACT News, 40, 81–86.
Enisa. (2009). Cloud computing risk assessment. http://www.enisa.europa.eu/act/rm/files/deliverables
Kim, G., & Spafford, E. (1994). “Design and implementation of tripwire: A file system integrity checker”, Purdue technical report CSD-TR-93-071. West Lafayette: Coast Laboratory, Department of Computer Sciences, Purdue University.
AIDE Team. (2005). Advanced intrusion detection environment. http://sourceforge.net/projects/aide
Harrison, C., & Chess, D. (1995). Mobile agents: Are they good? IBM Research Report.
Peine, H., & Stolpmann, T. (1997). The architecture of the Ara platform for mobile agents. In Proceedings of the first international workshop on mobile agents MA’97, LNCS no. 1219.
Straber, M., Baumann, M., & Mole, J. (1996). A Java based mobile agent system. In Proceedings of the ECOOP ’96 workshop on mobile object systems.
Farmer, W., Gutmann, J., & Swarup, V. (1996). Security for mobile agents: Issues and requirements. In Proceedings of the 19th national information systems security conference.
Rajkumar, B., Yeo, C., Venugopal, S., & Malpani, S. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems.
Aulbach, S., Grust, T., Jacobs, D., Kemper, A., & Rittinger, J. (2008). Multi-tenant databases for software as service: schema-mapping techniques. In Proceedings of the 2008 ACM SIGMOD international conference on management of data, pp. 1195–1206.
Alford, T., & Morton, G. (2009). The Economics of cloud computing. McLean: Booz Allen Hamilton.
Massaguer, D. (2005). Multi mobile agent deployment in wireless sensor networks. Master’s thesis, University of California.
Lipson, H. (2002). Tracking and tracing cyber-attacks: Technical challenges and global policy issues. SPECIAL REPORT CMU/SEI-2002-SR-009.
Neuman, B., & Tso, T. (1994). An authentication service for computer networks. IEEE Communications Magazine 32, pp. 33–38.
Hu, W. (1995). DCE security programming. ISBN 1-56592-134-8, O’Reilly & Associates.
Krishnamachari, B., Estrin, D., & Wicker, S. (2002). Impact of data aggregation in wireless sensor networks. In Proceedings of IEEE INFOCOM, pp. 575–578.
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A2006026).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, D., Jung, S., Hwang, DJ. et al. Mobile-Based DoS Attack Security Agent in Sensor Networking. Wireless Pers Commun 86, 91–107 (2016). https://doi.org/10.1007/s11277-015-3098-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-3098-3