A New Reliability Model for Evaluating Trustworthiness of Intelligent Agents in Vertical Handover
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 9
Abstract
Our previous works have proposed the deployment of mobile agents to assist vertical handover decisions in 4G. Adding a mobile agent in the 4G could lead to many advantages such as reduced consumption of network bandwidth, delay in network latency and reduction in the time taken to complete a particular task. However, this deployment demands that the deployed collection of agents shall be secure and trustworthy. Security of a mobile agent includes maintaining confidentiality, reality and integrity of not only the agent employed but also the system in which it is deployed. In fact, many conventional security solutions exists, however, very few of them addresses the challenge of introducing trusted computing in mobile agents, deployed in 4G, in particular. This paper proposes a new reliability model by implementing trust certificate for mobile agents in vertical handover.
Authors and Affiliations
Kailash Chander , Dimple Juneja
Computerized Steganographic Technique using Fuzzy Logic
Steganography is the method of providing Computer security in which hiding the required information is done by inserting messages within other messages, which is a string of characters containing the useful information,...
A Generic Model for Assessing Multilevel Security-Critical Object-Oriented Programs
The most promising approach for developing secure systems is the one which allows software developers to assess and compare the relative security of their programs based on their designs. Thereby, software metrics provid...
MDSA: Modified Distributed Storage Algorithm for Wireless Sensor Networks
In this paper, we propose a Modified distributed storage algorithm for wireless sensor networks (MDSA). Wireless Sensor Networks, as it is well known, suffer of power limitation, small memory capacity,and limited process...
Modeling Access Control Policy of a Social Network
Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the maj...
Enhancing the Secured Software Framework using Vulnerability Patterns and Flow Diagrams
This article describes the process of simplifying the software security classification. The inputs of this process include a reference model from previous researcher and existing Common Vulnerabilities and Exposure (CVE)...