By Topic

Impact of data integrity verification on wireless agent-based applications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Koutsouris, Nikos ; National Technical University of Athens, School of Electrical and Computer Engineering 9 Iroon Polytechniou St., Zographou 157 73, Greece ; Papanikitas, Kostas ; Theologou, Michael

The scope of this paper is to present and compare the intrusion detection methods that have been developed so far in wireless agent based systems. The security of the scheme focuses on data integrity verification of transactions that are based on mobile agent technology, by introducing a hybrid security algorithm. This algorithm, as well as two other standard security algorithms, is applied on a wireless agent-based e-commerce application and measurements of time overhead are being held.

Published in:

Wireless Conference 2006 - Enabling Technologies for Wireless Multimedia Communications (European Wireless), 12th European

Date of Conference:

2-5 April 2006