A New Reliability Model for Evaluating Trustworthiness of Intelligent Agents in Vertical Handover
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 9
Abstract
Our previous works have proposed the deployment of mobile agents to assist vertical handover decisions in 4G. Adding a mobile agent in the 4G could lead to many advantages such as reduced consumption of network bandwidth, delay in network latency and reduction in the time taken to complete a particular task. However, this deployment demands that the deployed collection of agents shall be secure and trustworthy. Security of a mobile agent includes maintaining confidentiality, reality and integrity of not only the agent employed but also the system in which it is deployed. In fact, many conventional security solutions exists, however, very few of them addresses the challenge of introducing trusted computing in mobile agents, deployed in 4G, in particular. This paper proposes a new reliability model by implementing trust certificate for mobile agents in vertical handover.
Authors and Affiliations
Kailash Chander , Dimple Juneja
Exploring Factors Associated with Voucher Program for Speech Language Therapy for the Preschoolers of Parents with Communication Disorder using Weighted Random Forests
It is necessary to identify the demand level of consumers and recognize the support target priority based on it in order to provide efficient services with a limited budget. This study provided baseline data for spreadin...
A Review of State-of-the-Art on Wireless Body Area Networks
During the last few years, Wireless Body Area Networks (WBANs) have emerged into many application domains, such as medicine, sport, entertainments, military, and monitoring. This emerging networking technology can be use...
Optimization of a Three-Phase Tetrahedral High Voltage Transformer used in the Power Supply of Microwave
This article deals with the optimization of a three-phase tetrahedral-type high voltage transformer, sized to supply three voltage-doubling cells and three magnetrons per phase. The optimization method used is based on a...
Influence of Adopting a Text-Free User Interface on the Usability of a Web-based Government System with Illiterate and Semi-Literate People
Illiterate and semi-literate people usually face different types of difficulties when they use the Internet, such as reading and recognising text. This research aims to develop and examine the influence of adopting a tex...
Power Analysis Attacks on ECC: A Major Security Threat
Wireless sensor networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same le...