{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T16:41:15Z","timestamp":1721666475871},"reference-count":44,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Information and Communication Technology Fund"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP) for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.<\/jats:p>","DOI":"10.1155\/2017\/3606424","type":"journal-article","created":{"date-parts":[[2017,3,29]],"date-time":"2017-03-29T21:00:29Z","timestamp":1490821229000},"page":"1-18","source":"Crossref","is-referenced-by-count":53,"title":["BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7711-5389","authenticated-orcid":true,"given":"Dina","family":"Shehada","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering Department, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1398-952X","authenticated-orcid":true,"given":"Chan Yeob","family":"Yeun","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1845-5946","authenticated-orcid":true,"given":"M. Jamal","family":"Zemerly","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Khalifa University, Abu Dhabi, UAE"}]},{"given":"Mahmoud","family":"Al Qutayri","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6469-9154","authenticated-orcid":true,"given":"Yousof","family":"Al Hammadi","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Khalifa University, Abu Dhabi, UAE"}]},{"given":"Ernesto","family":"Damiani","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0230-1432","authenticated-orcid":true,"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Engineering and Information Technology, The University of New South Wales, Sydney, NSW, Australia"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-011-9168-3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-010-9148-z"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-008-9043-z"},{"key":"4","volume":"582","year":"2013"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.10.002"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.09.002"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0041"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-011-9170-9"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1093\/ietcom\/e88-b.7.2837"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.04.006"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.01.006"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.09.130"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/wics.106"},{"issue":"3","key":"16","first-page":"6","volume":"3","year":"2003","journal-title":"EXP in Search of Innovation"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-26350-0_5"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9228-8"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.3745\/jips.2011.7.1.121"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04766-4_11"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0217"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2013.12.002"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74481-8_10"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2007.12.002"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-010-9175-8"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.03.010"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2008.05.018"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.977"},{"key":"31","first-page":"194","volume-title":"Mobile agents integrity research","volume":"251","year":"2007"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22540-6"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2006.04.008"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.01.004"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36981-0"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.001"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2013-271"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2012.10.003"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39962-9_83"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2013.2292192"},{"key":"45","volume-title":"Generic authentication architecture","year":"2006"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1165"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0434-9"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46665-7_35"},{"key":"49","year":"2012"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"52","first-page":"853","volume-title":"Key management protocol in wimax revisited","volume":"167","year":"2012"},{"issue":"3","key":"53","first-page":"237","volume":"17","year":"2015","journal-title":"International Journal of Network Security"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/3606424.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/3606424.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/3606424.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,29]],"date-time":"2017-03-29T21:00:34Z","timestamp":1490821234000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/3606424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":44,"alternative-id":["3606424","3606424"],"URL":"https:\/\/doi.org\/10.1155\/2017\/3606424","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}