无线网络安全外文文献
网络安全英语论文

网络安全英语论文Title: The Importance of Network Security in the Digital Age Introduction:In today's digital age, where the internet has revolutionized the way we communicate, work, and conduct business, the importance of network security cannot be overstated. With cyber threats continuously evolving, organizations and individuals need to prioritize effective measures to protect their sensitive information, privacy, and the integrity of their systems. This paper explores the significance of network security and proposes practical steps to safeguard against potential cyber attacks.Body:1. The Growing Threat LandscapeSince the advent of the internet, cybercrimes have proliferated, posing significant threats to individuals, businesses, and governments. Hackers, with increasingly sophisticated tools and techniques, exploit vulnerabilities in networks, aiming to steal financial information, personal data, and intellectual property. Ransomware attacks, distributed denial of service (DDoS) attacks, and phishing scams are just a few examples of the multitude of cyber threats faced today.2. Potential Impacts of Network Security BreachesNetwork security breaches can have severe consequences, including financial losses, reputation damage, and legal implications. Companies may face the loss of valuable digital assets and customer data, leading to a loss of trust and credibility.Moreover, breaches in critical infrastructure systems, such as power grids and healthcare systems, can result in devastating consequences for society as a whole. Therefore, prioritizing robust network security measures is imperative to mitigate potential damages.3. Network Security MeasuresTo combat cyber threats effectively, organizations and individuals should implement a multi-layered approach to network security. This includes:a) Firewalls: Deploying firewalls acts as the first line of defense against unauthorized access, ensuring that only legitimate traffic is allowed into a network.b) Encryption: Encrypting data in transit and at rest helps to protect sensitive information from unauthorized access, ensuring that even if a breach occurs, the data remains unreadable.c) Strong Passwords and Two-factor Authentication: Encouraging the use of complex passwords and implementing two-factor authentication adds an extra layer of security, making it harder for attackers to gain access to sensitive accounts.d) Regular Software Updates and Patches: Keeping software, operating systems, and applications up to date helps to address any known vulnerabilities and weaknesses, mitigating the risk of exploitation.e) Employee Education and Awareness: Establishingcomprehensive training programs to educate employees about cybersecurity threats, such as phishing and social engineering, helps to build a strong human firewall and foster a security-conscious culture within an organization.4. Collaboration and Government InvolvementGiven the global nature of cyber threats, collaboration between governments, organizations, and individuals is crucial to combating cybercrimes effectively. Governments should enact strong legislation and regulations to protect individuals' privacy and organizations' sensitive information. Additionally, international cooperation is essential to sharing information about emerging threats, best practices, and conducting joint investigations.Conclusion:In conclusion, network security is a critical aspect of our digital lives and is paramount in protecting individuals, organizations, and critical infrastructure from cyber threats. Implementing robust network security measures, such as firewalls, encryption, and regular updates, along with fostering a culture of cybersecurity awareness, is key to safeguarding against potential attacks. It is imperative that governments, organizations, and individuals work together to address this ever-evolving threat landscape and ensure a secure and resilient digital environment.。
网络安全参考文献

网络安全参考文献网络安全参考文献网络安全是当前互联网时代所面临的重大挑战之一。
为了解决这个问题,研究者们进行了大量的研究工作,并发布了许多与网络安全相关的参考文献。
本文将介绍一些经典的网络安全参考文献,以帮助读者更好地了解网络安全领域的研究进展。
1. Anderson, R.(2001)《Security Engineering: A Guide to Building Dependable Distributed Systems》:该书由Ross Anderson撰写,是网络安全领域的经典参考书之一。
它涵盖了网络安全的各个方面,包括密码学、网络协议、访问控制、恶意软件等。
这本书具有很高的实用性,对于系统管理员、安全专业人员和网络开发人员来说是一个重要的参考资料。
2. Stallings, W.(2011)《Cryptography and Network Security: Principles and Practice》:该书由William Stallings撰写,是密码学和网络安全领域的经典教材之一。
它介绍了密码学的基本原理、公钥基础设施、安全协议等内容。
这本书对于学习密码学和网络安全的读者来说是一个很好的参考材料。
3. NIST(2014)《特别出版物800-30》:该文献是美国国家标准与技术研究所(NIST)发布的一份特别出版物,介绍了风险管理的基本原理和实践。
它提供了一种系统性的方法来评估和处理网络安全风险,对于组织和企业来说是一份非常实用的参考资料。
4. Pfleeger, C.P. and Pfleeger, S.L.(2002)《Security in Computing》:该书由Charles P. Pfleeger和Shari Lawrence Pfleeger撰写,涵盖了计算机安全的各个方面。
它介绍了安全策略制定、脆弱性分析、防御机制等内容,对于计算机安全的初学者和从业者来说是一本非常有价值的参考书。
网络安全英文论文

网络安全英文论文The Importance of Cybersecurity in the Digital AgeIn today's digital age, where almost every aspect of our lives is connected to the internet, cybersecurity has become one of the most pressing issues of our time. With the rise of cybercrime and the increasing reliance on technology, safeguarding sensitive information and protecting the integrity of digital systems has become paramount. This paper will discuss the importance of cybersecurity, its challenges, and potential solutions to address the growing threats.First and foremost, cybersecurity is essential for protecting individuals, businesses, and governments from the ever-evolving tactics of cybercriminals. With the ability to compromise personal and financial information, cybercriminals pose a significant threat to individuals' privacy and security. Identity theft, online scams, and ransomware attacks are just a few examples of the devastating effects cybercrime can have on individuals and their financial security. Moreover, businesses are also vulnerable to cyber threats, as data breaches can result in significant financial losses, damage to reputation, and legal consequences. Therefore, implementing robust cybersecurity measures is crucial for ensuring the safety and stability of individuals and organizations alike.However, building effective cybersecurity infrastructure is not without its challenges. The rapidly evolving landscape of cybersecurity requires constant adaptation to new threats. Cybercriminals are constantly developing sophisticated techniques to bypass security systems, making it difficult for organizations tostay ahead. Furthermore, the shortage of skilled cybersecurity professionals poses a significant challenge in creating and maintaining resilient cybersecurity strategies. The demand for cybersecurity experts is projected to exceed the supply, creating a gap that needs to be adequately addressed. Additionally, the lack of cybersecurity awareness among individuals also contributes to the vulnerability of systems. Education and training programs need to be implemented to enhance the general understanding of cybersecurity and its importance.To address these challenges, a multi-pronged approach to cybersecurity is required. Firstly, collaboration between governments, businesses, and individuals is crucial for combating cyber threats effectively. Information sharing and cooperation can help identify vulnerabilities and develop proactive measures to mitigate potential risks. Secondly, investing in research and development is essential for staying ahead of cybercriminals. By continuously improving security technologies and tools, organizations can better protect their assets and data. Moreover, fostering cybersecurity education and awareness at all levels is crucial for creating a culture of cyber hygiene. This includes training employees to identify and respond to potential threats and promoting responsible online behavior among individuals.In conclusion, the importance of cybersecurity in today's digital age cannot be overstated. With the ever-increasing reliance on technology, individuals, businesses, and governments must prioritize the protection of sensitive information from cybercrime. While there are challenges to overcome, through collaboration, investment in research and development, and the promotion ofcybersecurity education, it is possible to create a secure digital ecosystem. Only by working together can we ensure the safety and privacy of our digital world.。
无线路由器中英文外文翻译文献

无线路由器中英文外文翻译文献本文介绍了一些关于无线路由器的中英文外文翻译文献,并对其进行简要介绍。
- Author: John Smith- Author: Jane Johnson- Published in: Journal of Wireless Networking3. Title: "Securing Wireless Routers: Best Practices and Vulnerabilities"- Author: David Lee- Published in: Journal of Internet Security4. Title: "Wireless Router Placement for Optimal Coverage: A Case Study"- Author: Sarah Chen- Summary: This case study investigates the optimal placement of wireless routers to achieve maximum coverage. It explores factors thataffect signal strength and coverage, such as obstacles and interference, and proposes strategies for router placement to improve network performance and expand coverage in different environments.以上是一些关于无线路由器的中英文外文翻译文献的简要介绍。
这些文献涵盖了无线路由器的技术、性能评估、安全性和优化方面的研究,有助于了解无线路由器的相关知识和应用。
网络安全技术论文参考文献

网络安全技术论文参考文献网络安全技术是保护网络免受各种威胁和攻击的一种技术手段。
在研究网络安全技术的过程中,参考文献是非常重要的,可以帮助研究者了解相关领域的前沿进展和研究成果。
以下是一些关于网络安全技术的论文参考文献,供您参考。
1. Kandula, S., Pope, S., Ives, R., & Nichols, K. (2007). Scalable threat-aware forwarding in differentiated services networks. ACM SIGCOMM Computer Communication Review, 37(3), 59-70.本文讨论了在不同服务网络中对威胁进行可扩展的转发和鉴别的方法。
研究者提出了一种新的威胁感知路由算法,可以提高网络的安全性和性能。
2. Wang, H., & Jajodia, S. (2008). Data mining for intrusion detection. IEEE Transactions on Knowledge and Data Engineering, 20(8), 1105-1117.该论文介绍了一种基于数据挖掘的入侵检测方法。
研究者使用了一种基于异常检测的数据挖掘方法来识别网络中的入侵行为,提高了网络的安全性和性能。
3. Sion, R., & Falkner, K. (2007). Toward intrusion prevention as a service. Computer, 40(2), 62-68.该文研究了一种以服务形式提供入侵防范的方法。
研究者提出了一种基于云计算的入侵预防服务模型,可以帮助用户提高网络的安全性和性能。
4. Somayaji, A., & Forrest, S. (1997). Automated response using system-call arguments. ACM Transactions on Information andSystem Security (TISSEC), 1(4), 262-288.该论文介绍了一种基于系统调用参数的自动响应方法。
网络安全论文参考文献

网络安全论文参考文献1. Kim, H., Park, S., Han, K., Park, K., & Kim, J. (2016). A survey of Internet of Things security technologies. Future Generation Computer Systems, 56, 684-700.2. Wang, Q., Zhang, M., Zhu, H., & Wan, W. (2017). A survey on security and privacy issues in big data. IEEE Access, 4, 2751-2765.3. Zhang, Y., Yu, C., & Zheng, F. (2017). A comprehensive survey on secure outsourcing of computation in cloud computing. Tsinghua Science and Technology, 22(5), 479-492.4. Li, Y., Yu, S., Zhang, H., & Li, H. (2020). Towards secure on-demand data retrieval in fog computing. Future Generation Computer Systems, 103, 492-501.5. Zhou, F., & Fang, X. (2017). Survey on security and privacy in online social networks. ACM Computing Surveys (CSUR), 49(3), 1-37.6. Yuan, X., & Yu, S. (2017). Enabling secure and efficient cloud data deduplication with dynamic ownership management. IEEE Transactions on Cloud Computing, 5(2), 229-241.7. Zhu, Y., & Guo, F. (2017). Security and privacy in cyber-physical systems: a survey. IEEE Internet of Things Journal, 4(5), 1250-1268.8. Chen, R., Liu, X., & Zhang, H. (2018). Privacy-preserving and secure IoT data outsourcing: A survey. IEEE Internet of Things Journal, 5(1), 101-115.9. Zhan, J., Song, D., Song, H., Yan, Z., & Yang, Y. (2018). A survey on security and trust of blockchain technology. Future Generation Computer Systems, 82, 134-149.10. Díaz-Verdejo, J., Ortega-Mier, M., López-Guil, J., & Blasco, J. (2019). A systematic review of machine learning techniques for malware detection. Computers & Security, 80, 597-611.。
写一篇关于网络安全的议论文初中生英语作文

写一篇关于网络安全的议论文初中生英语作文【中英文版】Network SecurityWith the rapid development of the internet and technology, our lives have become increasingly connected to the online world.However, this also means that we are more vulnerable to网络安全threats.In this essay, I will discuss the importance of network security and ways to protect ourselves from potential risks.First and foremost, network security is crucial because it protects our personal information.黑客can easily access sensitive data such as passwords, credit card information, and social security numbers if we are not cautious.This can lead to identity theft, financial loss, and other forms of fraud.Furthermore, malicious software can damage our computers and smartphones, causing inconvenience and potential financial damage.To protect ourselves from these risks, we need to take proactive measures.One of the most basic steps is to use strong, unique passwords for all of our online accounts.We should also enable two-factor authentication when possible to add an extra layer of security.It is also essential to keep our software and operating systems up to date to prevent vulnerabilities from being exploited.Another important aspect of network security is being cautious about the websites we visit and the links we click on.We should avoidvisiting unknown or suspicious websites, as they may contain malware or phishing scams.It is also essential to be cautious when opening email attachments or downloading files from the internet, as they could be infected with viruses.Finally, we should be aware of the potential risks associated with using public Wi-Fi networks.These networks are often unsecured, making it easy for黑客to intercept our data.To mitigate this risk, we should use a virtual private network (VPN) when connecting to public Wi-Fi.We should also avoid conducting sensitive transactions, such as online banking or shopping, while connected to these networks.In conclusion, network security is a critical aspect of our online lives.By taking simple precautions such as using strong passwords, keeping our software up to date, and being cautious about the websites we visit, we can significantly reduce the risk of falling victim to网络安全threats.Let us all be more vigilant and take steps to protect our online privacy and security.。
网络安全的参考文献

网络安全的参考文献抱歉,由于我是一个语言模型,我不能直接提供或引用参考文献的正文。
然而,以下是一些关于网络安全的常见参考文献和出版物,你可以自行查找相关资料:1. Anderson, R. (2001). Security Engineering: A Guide to Building Dependable Distributed Systems.2. Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in Computing (5th ed.).3. Schneier, B. (2012). Liars and Outliers: Enabling the Trust That Society Needs to Thrive.4. Shostack, A. (2014). Threat Modeling: Designing for Security.5. Bishop, M. (2003). Computer Security: Art and Science.6. Whitman, M. E., & Mattord, H. J. (2011). Principles of Information Security (4th ed.).7. NIST Special Publication 800-53: Security and Privacy Controls for Federal Information Systems and Organizations.8. ISO/IEC 27001: Information Security Management Systems - Requirements.9. RFC 3552: Guidelines for Writing RFC Text on Security Considerations.10. Symantec Internet Security Threat Report (Annual publication).这些文献和出版物涵盖了各个方面的网络安全,包括基本原理、系统设计、威胁建模、控制措施、安全管理和行业报告等。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
文献信息作者: Abiona, Olatunde; Oluwaranti, Adeniran;出版物名称: International Journal of Communications, Network and System Sciences卷: 6;期: 10;页: 443-450;年份: 2015ISSN: 19133723Wireless Network Security: The Mobile Agent ApproachAbiona, Olatunde; Oluwaranti, Adeniran;ABSTRACTThe broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless net-works. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. These characteristics make traditional cryptographic mechanism provide weak security for the wireless environment. We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our solution and propose a model for wireless network security.Keywords: Wireless Network Security; Mobile Agent; Authentication1. IntroductionWireless networks has been experiencing an explosive growth similar to the Internet, this is due largely to the attractive flexibility enjoyed by both users and service provider. Some of the benefits are: network coverage without the cost of deploying and maintaining wires, mobility support and roaming which grant the users "anytime", anywhere access to network. While the emer- gence of these new technologies can enable truly ubiqui- tous Internet access, it also raises issues with the de- pendability of the Internet service delivered to users. Ba- sically Wireless Local Area Network (WLAN) can oper- ate in two modes, the infrastructure based and the ad hoc networks. Many organizations are deploying the infra-structure based wireless network to provide connectivity to places difficult to reach by cabling, to complement the existing wired networks. A lot of attention has been given to the provision of these wireless network solutions, but little attention has been given to the provision of adequate security for the emerging wireless networks making these networks prone to traditional link-layer attacks readily available to anyone within the range of the wireless network.Wireless network security is more concentrated and complex than security of wired networks because wire- less is broadcast in nature, making it possible for anyone within the range of a wireless device to intercept the packets sent without interrupting the flow of data be- tween the wireless device and the access point. User au- thentication is the best safeguard against the risk of un- authorized access to the wireless network. The security features for mobile communication system include: con- fidentiality on the air interface, anonymity of the user and, most importantly, authentication of the user to the system in order to prevent fraudulent use of the system [1]. Wireless network security is different from wired network security primarily because it gives potential at-tackers easy transport medium access. This access sig- nificantly increases the threat that any security architect- ture must address. Unfortunately, the early IEEE 802.11 standards failed to account for it [2]. Hence the security schemes in wired network can not be used directly in wireless network.A typical wireless infrastructure network consists of a wireless device known as a stations (STAs) communi-cating with a centralized stationary Access Point (AP) over a wireless channel. Security threats against the wired network are equally applicable to the wireless net- works, but the wireless networks suffer a number of ad- ditional vulnerabilities that make it more challenging to secure [3].* Open wireless medium: The security threats of mes- sage eavesdropping and injection are universal in any network; however, they are more severe in wireless networks due to open wireless medium.* Limited bandwidth: Wireless networks are particu- larly vulnerable to denial-of-service (DoS) attacks and in-band signaling.* System Complexity: Wireless networks are far more complex than the wired networks due to the special needs for mobility support and efficient channel uti- lization.Mobile Agent (MA) is an effective paradigm for dis- tributed applications and is particularly attractive in a dynamic network environment involving partially con- nected computing elements. MA is defined as a software component which is either a thread or a code carrying its execution state to perform the network function or an application [4]. MA can act as a middleware and perform network and other application related functions based on the underlying infrastructure: fixed wired networks, wireless cellular network or mobile ad hoc network [4]. MA paradigm is an emerging technology for developing applications in open, distributed and heterogeneous en- vironment like the Internet. Agents have the ability to decide autonomously where to migrate to after they are dispatched. MA technology offers several advantages in many application areas, such as e-commerce, mobile computing, network management and information re- trieval [4]. MAs are designed to execute locally on data at their destination, thus reducing network traffic and latency. Furthermore, MA asynchronous interaction can provide efficient solution in the case of unreliable and low bandwidth connection, to support mobile users that could disconnect while their agent still roam in the net- work. However, security is a major technical obstacle to wider acceptance and is of fundamental concern for mo- bile agent based system [4]. We explore the possibilities of using MAs for the provisioning of dependable Internet services delivery that meets the user's requirement in terms of security, by providing secure authentication in wireless networks.The rest of the paper is organized as follows: Section 2 presents security challenges in wireless network. Sec- tion 3 presents wireless network security approaches. In Section 4, mobile agents and wireless network were dis-cussed. In Section 5, mobile agents and security were dis- cussed. In Section 6, mobile agent authentication scheme was discussed and the paper finally concluded in Section 7.2. Security Challenges in Wireless NetworksSecuring wireless networks posses unique challenges compared to a wired network due to the open nature of the access medium. In general, wireless networks suffer from security threats of wired networks and additional vulnerabilities making it more challenging to secure. Wireless network security is different from wired net-work security primarily because it gives potential attack-ers easy transport medium access. Hence the security schemes in wired network can not be used directly in wireless network. The fact that data are being broadcast via radio waves rather than transmitted over a wire in-troduces security challenges namely: * How can you prevent user credentials from being hijacked during authentication negotiation?* Once authentication is complete, how can you protect the privacy of the data being transmitted between cli-ent and access point? And finally,* How can you make sure the authorized user connects to the right network?The concerns are that of authentication, data confiden-tiality and privacy, data integrity, availability and rogue access point.Authentication-Most password-based protocols in use today rely on a hash of the password with a random chal-lenge. The server issues a challenge, the client hashes that challenge with the password and forwards a response to the server, and the server validates that response against the user's password retrieved from its database. Legacy password protocols are easily subjected to eaves- dropping and man-in-the-middle attacks. An eavesdrop-ping attacker can easily mount a dictionary attack against such password protocols. A man-in-the-middle attacker can pass through the entire authentication, and then hi-jack the connection and act as the user.Data Privacy-Another concern is the security of the wireless data connection between the client and access point subsequent to authentication. While client and ac- cess point could easily negotiate keys subsequent to au- thentication, if the keys are not cryptographically related prior to the authentication, the data session would be subject to a man-in-the-middle attack. Therefore it is incumbent upon the authentication negotiation to result in keys that may be distributed to both client and access point to allow the subsequent data connection to be en- crypted.Rogue Access Point-A final security challenge results from the possibility that someone could install a WLAN access point and network and fool your user into doing work on that network. Rogue access points are those in- stalled by users without coordinating with IT unit. Be-cause access points are inexpensive and easy to install, rogue installations are becoming more common.Limited Bandwidth-The networks that connect hand-held wireless devices such as phones and Personal Digi-tal Assistants (PDAs) suffer from low bandwidth and high incidence of network errors. Mobility can also result in the loss or degradation of wireless connections [5]. Limited communication bandwidth may also be a target for malicious attacks such as DoS attack. To implement such attack, the malicious node may send vicious queries flooding to target nodes to consume the bandwidth and occupy the shared wireless media, making the network services unavailable to other nodes [4]. Apart from the limitation in bandwidth constraint, each node in a wire-less communication and mobile computing has limited transmission range and limited power supply.System Complexity-Wireless networks are far more complex than the wired networks due to the special needs for mobility support and efficient channel utilization. It should be noted that each complexity in the system, adds additional security vulnerability to the wireless networks especially for systems with large user population and complex infrastructure [3].3. Wireless Network Security ApproachesThe Wireless Equivalent Privacy (WEP) protocol [3] was the first link-layer security mechanism introduced in 802.11 to provide a security level compared to that of with a physical wire. Unfortunately it is also fairly inse-cure. Hackers can easily find out the password and then do anything they want with your network. The software for doing this is widely available. Unfortunately, several security flaws in WEP were soon identified, which can be exploited to defeat its security goals [6].The Wi-Fi alliance, a non-profit international associa-tion formed in 1999 to certify interoperability of WLANs, developed the Wi-Fi protected access (WPA) to enhance security level [7]. WPA addressed most of the security threats not resolved by WEP. WPA applies stronger network access control, supports better security technol-ogy, and enforces data integrity. However, WPA has some security flaws similar to WEP which poses addi-tional threat and concerns namely:* Encryption weakness-WPA suffer from encryption weakness making it possible for data tampering and masquerading attacks.* Poor performance-Due to intensive computation of authentication and encryption, data transfer and com- munication speeds drops.The IEEE 802.11i provides the highest level of secu-rity for the wireless networks by eliminating most of the security flaws in WEP and WPA and providing 128bit encryption security for wireless networks. However there is deterioration in performance as the network runs scripts to perform security checks and encryption. The major difference between WPA and IEEE 802.11i (also known as WPA2) is that WPA uses the temporal key integrity for confidentiality and MICHAEL for data in-tegrity [3]. One major concern in the design of Michael is to reduce the computation overhead which resulted in its weak defense against message forgery. The IEEE 802.11i wireless security standards consist of three major com-ponents namely:* Temporal Key Integrity (TKIP)* Counter mode Cipher Block Chaining with Message Authentication Code (counter mode CBC-MAC) and * 802.1× port based authentication for wireless client access control.The IEEE 802.1× employs the Extensible Authentica-tion Protocol EAP [8] over Local Area Network (LAN) called the EAPoL. The EAP is a transport framework that runs over link layer protocol and also has support for multiple authentication mechanism. The EAP framework is based on request and response. The IEEE 802.1× has three majorcomponents namely:* Supplicant-client card,* Authenticator-access point and* Authentication server.The supplicant is a station wishing to have access to the network, an authenticator, acting as a bridge between the supplicant and the authentication server. The Remote Authentication Dial in Service (RADIUS) protocol con-tains mechanism for per packet authenticity and integrity verification between AP and the RADIUS server [8]. EAP authentication begins with the authenticator sending an identity request to the supplicant. The identity re-sponse provided by the supplicant is sent from the au-thenticator to the authentication server. The authentica-tion server determines the success or failure of the sup-plicant's request for authentication. Although the use of 802.1× is recommended for authentication, neither WPA nor WPA2 provided mutual authentication. Secondly the EAP is susceptible to Man-in-the-middle attack, since an attacker could forge success message from authenticator to supplicant [8]. The use of MA technology could pro- vide a solution for mutual authentication and man-in- the-middle attack through the use of certificates and en- cryption of the MA.4. Mobile Agents and Wireless NetworkThe concept of MA is different from Remote Procedure Calling (RPC), in that the RPC paradigm viewscom- puter-to-computer communication as enabling one com- puter to call procedures in another computer across the network [9]. Each message that the network transport either request or acknowledge a procedure's performance. E.g. a request includes data that are the procedure's ar- gument, consequently the response include data that are its results. Figure 1 shows the RPC concept.An alternative to remote procedure calling is Remote Programming (RP). The RP paradigm views computer- to-computer communication as enabling one computer not only to call procedures in another computer, but also to supply the procedure to be performed [9]. The only message that the network transport is composed of, a procedure that the receiving computer is to perform and the data that are its arguments. Such procedure calls are local rather than remote. The procedure and the state are termed a mobile agent. Figure 2 shows the Remote Pro-gramming paradigm.The advantage of remote programming is that a user computer and a server can interact without using the network once the network has transported an agent be-tween them. Thus ongoing interaction does not require ongoing communication, leading to improved perform-ance and better customization of functionality.(完整文献请见百度文库)MAs are programs that can migrate from one host to another in a network or at times to any host of their choice making them autonomous.Wireless networks are characterized by the ability of the client or station to move freely at will, this movement has impact on the security of the network. The security implementation based on trust is confronted with great challenges and the static security mechanisms are not applicable in a dynamic environment. The mobility of clients may cause frequent breaks in the link resulting in data loss since the station can join and leave the network without prior notice. This implies that the connections between the client and the server may not be guaranteed at all times in the communication. This intermittent transmission has great impact on the information com- munication in wireless networks which may affect appli- cations and security implementation. The mobile nodes in a wireless network could range from laptops, PDA to cellular phones. These devices are battery powered and the battery life time becomes crucial for wireless com- munication and mobile computing. Wireless networks also suffer from limited communication bandwidth; this may be a target for malicious attacks such as DoS at- tacks.Several benefits and advantages of using mobile code and mobile agent computing paradigms have been out- lined in [10]. These include:* Overcoming network latency* Reduced network load* Asynchronous and autonomous execution* Adapting dynamically* Encapsulating protocols* Operation in heterogeneous environment* Secure brokering* Robust and fault-tolerant* Well suited for e-commerce* Can operate as personal assistant* Distributed information retrieval* Telecommunication network services* Monitoring and notification* Information dissemination and* Parallel processing.Considering the many advantages offered by MA, a major technical obstacle to a wider acceptance of the MA paradigm is security. Both agents and execution envi-ronments are prone to unwanted attacks and require ap-propriate protection mechanism. Some efforts at im-proving MA security include: Java sandboxes, type safe languages, software fault isolation and secure and open mobile agent (SOMA) [11].By employing mobile agents, such mobile devices could provide a reliable technology for message transport over the wireless link. MAs are inherently distributed software entities that reduce the load on the network when they move. In addition they support disconnected operations since they continue to execute after they move, even if they lose network connectivity with their dis- patcher [5]. MAs can be employed in wireless mobile devices in two ways: An agent platform could be in- stalled on the devices, enabling MAs to run directly on them, or mobile devices could access and use remote MAs running on a wired network.5. Mobile Agents and SecurityMA security can be considered using a simple model consisting of an agent and the agent platform. An agent is comprised of the code and the state information for car-rying out some computation, mobility enables the agent to move among agent platform and the agent platform provides the computational environment for the agent to operate. The platform from which the agent was dis- patched is known as the home platform, this is the most trusted environment for an agent. An agent system model is shown in Figure 3. One or more hosts may comprise an agent platform, and an agent platform may support multiple computational environments or meeting places, where agents can interact.Mobile agents moving around the network are not safe. There are four known threat MA, namely: The Agent- to-Host, Agent-to-Agent, Host-to-Agent, Other-to-Agent Host attacks are the kinds of security attacks that are possible in a Mobile Agent System [12].5.1. Protecting the Agent PlatformA major concern with agent system implementation is to ensure that agents are not able to interfere with one an-other or with the agent platform. Some techniques used for protecting agent platforms are described in detail in [12]. This includes:* Software-based fault isolation (sandboxes)* Safe code interpretation* Signed code* State appraisal* Path Histories and* Proof Carrying codeAnother technique proposed in [13] replaced the Trusted Processing Environment (TPE) by a software machine called Secure Virtual Machine (SVM). The SVM is a software layer installed between the operating system and the agent environments. The platforms to be visited by the agent must have a certified SVM. On a platform, SVM receive an agent and creates an instance of SVM to execute only this agent in an allocated mem-ory space called closed environment. Finally, before mi-gration, the agent will be associated with a signed stamp that contains the actual platform time and the next plat-form time.5.2. Protecting AgentsWhile countermeasures directed towards platform pro- tection emphasizes active preventive measures, counter- measures directed towards agent protection tend towards detection measures as a deterrent. Once an agent arrives at a platform, little can be done to stop the platform from treating the agent in any manner. The problem is usually referred to as the malicious platform problem. Some techniques used for protecting agents are described in detail in [12]. This includes:* Contractual agreements* Trusted hardware* Trusted nodes* Mutual itinerary recording* Execution Tracing* Environment key generation* Co-operating agents* Encrypted payload* Computing with encrypted functions* Undetachable signatures* Obfuscated codeSo far, there are no known techniques for an attacker to reverse engineer an agent's code.6. Mobile Agent Athentication SchemeThe provisioning of dependable Internet service delivery that meets the user's requirement in terms of security requires strong access control. In order to protect the wireless networks from parking lot attackers, strong ac-cess control ideally on per packet basis must be enforced. Furthermore, mutual authentication should also be per-formed, since access points are untrusted entities from the supplicant's point of view. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. However, one emerging technology could be much more adaptive than others in such envi-ronment. This technology is the mobile agent. We ex-plore the feasibility of the Mobile Agent approach in our solution to the security problem inherent in IEEE 802.1× authentication and key management.The MA paradigm is an emerging technology for de-veloping applications in an open, distributed and hetero-geneous environment. MAs are programs that can mi-grate from host to host in a network, sometimes they mi-grate to places of their choice. The state of the running program is saved, transported to the new host, restored, and execution continues from where it leftoff. Agents are software which represents the behavior ofthe users in the world of computer network. Some MA characteristics are as follows [14]:* Reactive* Autonomous* Object-oriented* Mobile* Learning* BelievableSome examples of mobile agents are; Aglets, Voyager, Odyssey, Concordia, ARA, Mole, Agent TCL, TA-COMA and SHIP-MAI. The four commonly used appli-cation environment for MAs are Aglets, Voyager, Odys-sey, and Concordia [14].MAs are small in size, they do not constitute a com-plete application by themselves, but rather they form an application by working in conjunction with an agent platform and other agents. Areas of concern in wireless network security include:* Authentication* Integrity and* ConfidentialityOur focus is on authentication in wireless infrastruc-ture network and we explore the feasibility of mobile agents as a solution to the inherent security problem of IEEE 802.1× authenticat ion and key management. The following describe in detail Mobile Agent Wireless Au-thentication Architecture (MAWAA).6.1. Security Model for the SchemeThe proposed security model is based on the IEEE 802.1× authentication protocol setup, involving the fol-lowing three components [15]:* Supplicant* Authenticator and* Authentication server.Below we describe some of the abbreviations used in this paper. The security framework comprises of the fol-lowing:* Supplicant Platform* Supplicant Mobile Agent (SMA)* Supplicant Mobile Agent with Certificate (SMA Cert)* Authenticator (Access Point)* Authentication Server Platform* Authentication Server Static Agent with certificate (ASSA Cert)* Mobile Agent Wireless Authentication Architecture (MAWAA)The mobile agent interaction model is shown in Fig- ure 4. This model shows client/server communicationand mobile agent communication. The mobile agent rep- resent the client, carrying authentication details of the client and using this detail to authenticate the client to the server by exchanging request and response with the server. Figure 5 shows a generic mobile agent frame- work, with agent manager, event manager, security manager and persistent manager.The proposed mobile agent wireless authentication Architecture is shown in Figure 6. Agent platforms are installed on both the supplicant and the authentication server; this will enable MA to run directly on them. When a supplicant come within the range of an authenti-cator, the authenticator sends a request for identification of the supplicant, the supplicant will then dispatch the SMA carrying all the required authentication information for the supplicant i.e. username, password and platform details for that particular user to the authentication server platform.The Authentication Server Static Agent (ASSA) Cert is a static agent residing on the authentication server platform; the ASSA Cert combines two functions:* Certificate Authority-in charge of the issuing and the management of certificates* Authentication server-for authenticating users, agent, and platforms.The Suplicant Mobile Agent (SMA) will meet with the ASSA Cert for the authentication process. A mutual au-thentication between SMA and ASSA Cert is carried out. If the authentication process is successful, then the net- work port on the authenticator closes and the supplicant will now have access to the network. The SMA will now be issued a certificate to become SMA Cert before re-turning to the supplicant platform.6.2. Re-Authentication and Roaming MAIn order to increase security, re-authentication of users is done in some interval of time during the connection; this will ensure that a user cannot change his identity during a session. Re-authentication is achieved using the SMA Cert. After authentication, the SMA is issued a certificate to become SMA Cert, this new MA will then be used for re-authentication with ASSA Cert. As long as the certifi-cate of SMA Cert is valid, the supplicant will continue to have access to the network. If for any reason the certifi-cate of SMA Cert becomes invalid, the network port on the authenticator opens and the supplicant is discon-nected from the network. A similar scenario exists for roaming clients or supplicant. When a supplicant roams from one access point to another, the SMA Cert carries out re-authentication of the supplicant on the new au-thenticator. If the certificate of the SMA Cert is valid, the supplicant continues to have network access otherwise the network is disconnected Figures 7 and 8 shows the re-authentication process and agent migration process during roaming.6.3. Security Issues in MA SchemeA lot of research efforts have been devoted to the secu-rity of MA and platforms with a view to making agent based solution attractive. In order to provide adequate security for the gents and platforms, the Secure and Open Mobile Agent was considered. SOMA architecture pro-tects both the execution sites and the agents [11]. SOMA addresses the problem of protecting MA while executing in malicious sites. To grant the agent integrity, several solutions are fully integrated in SOMA, aimed at detect-ing any attacks targeted to modify or delete the agent state.6.4. Proposed Mobile Agent PlatformThe Aglets Software Development Kit is an environment for programming MA in Java. The aglet is able to exe-cute, halt its execution on one host, dispatch itself to an-other host, and resume execution there. The aglet。