Wireless Network Security: The Mobile Agent Approach


The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. These characteristics make traditional cryptographic mechanism provide weak security for the wireless environment. We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our solution and propose a model for wireless network security.

Share and Cite:

O. Abiona, A. Oluwaranti, A. Oluwatope, S. Bello, C. Onime, M. Sanni and L. Kehinde, "Wireless Network Security: The Mobile Agent Approach," International Journal of Communications, Network and System Sciences, Vol. 6 No. 10, 2013, pp. 443-450. doi: 10.4236/ijcns.2013.610046.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] J. Zhu and J. Ma, “A New Authentication Scheme with Anonymity for Wireless Environments,” IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, 2004, pp. 231-235.
[2] W. A. Arbaugh, “Wireless Security Is Different,” Magazine of IEEE Computer Society, Computer, Vol. 36, No. 8, 2003, pp. 99-101.
[3] H. Yang, F. Ricciato, L. Songwu and L. Zhang, “Securing a wireless world,” The Proceedings of IEEE, Vol. 94, No. 2, 2006, pp. 442-454.
[4] S. P. Alampalayam and A. Kumar, “An Adaptive Security Model for Mobile Agents in Wireless Networks,” IEEE Global Telecommunications Conference, Newark, 1-5 December 2003, pp. 1516-1521.
[5] L. Vasiu and Q. H. Mahmoud, “Mobile agents in Wire-less Devices,” Magazine of IEEE Computer Society, Computer, 2004, Vol. 37, No. 2, pp. 104-105.
[6] W. Arbaugh, N. Shankar, Y. Wan and K. Zhang, “Your 802.11 Wireless Network Has No Clothes,” IEEE Wire-less Communication, Vol. 9, No. 6, 2002, pp. 44-51.
[7] A. Karnik and K. Passerini, “Wireless Network Security—A Discussion from a Business Perspective,” Proceedings of IEEE Wireless Telecommunications Symposium, Nicosia, April 2005, pp. 261-267.
[8] A. Mishra and W. A. Arbaugh, “An Initial Security Analysis of the IEEE 802.1× Standard,” Report No CS-TR-4328, 2002.
[9] J. White, “Mobile Agents White Paper,” General Magic, Inc., 1996.
[10] D. Lange and M. Oshima, “Seven Good Reasons for Mobile Agents,” Communications of ACM, 1999, Vol. 42, No. 3, pp. 88-89.
[11] A. Corradi, R. Montanari and C. Stefanelli, “Security No.s in Mobile Agent Technology,” Proceedings of 7th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS’99), Cape Town, December 1999, pp. 3-8.
[12] N. Borselius, “Mobile Agent Security”, Electronics and Communication Engineering Journal, Vol. 4, No. 5, 2002, pp. 211-218. http://dx.doi.org/10.1049/ecej:20020504
[13] H. Aouadi and M. B. Ahamed, “Modile Agents Security,” 2nd International Conference on Mobile Technology, Applications and Systems, Guangzhou, November 2005, pp. 1-6.
[14] Y. Wang, C. Wang and L. Cheng-Horng, “Mobile Agent Protection and Verification in the Internet Environment,” Proceedings of 4th International Conference on Computer and Information Technology, Wuhan, September 2004, pp. 482-487,
[15] N. Aboudagga, M. T. Refaei, M. Eltoweissy, L. A. Dasilva and J. Quisquater, “Authentication Protocols for Ad Hoc Networks: Taxonomy and Research No.s,” Proceedings of 1st ACM International Workshop on QoS and Security in Wireless and Mobile Networks, Montreal, October 2005, pp. 96-104.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.