{"id":"https://openalex.org/W7133204953","doi":"https://doi.org/10.1145/3789514.3792057","title":"Seeking Trust in Resource-Constrained Edge Networks with Mobile Agents: Complications with ZTA","display_name":"Seeking Trust in Resource-Constrained Edge Networks with Mobile Agents: Complications with ZTA","publication_year":2026,"publication_date":"2026-02-25","ids":{"openalex":"https://openalex.org/W7133204953","doi":"https://doi.org/10.1145/3789514.3792057"},"language":null,"primary_location":{"id":"doi:10.1145/3789514.3792057","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3789514.3792057","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th International Workshop on Mobile Computing Systems and Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3789514.3792057","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Justin Henry","orcid":"https://orcid.org/0009-0001-6997-9718"},"institutions":[{"id":"https://openalex.org/I25041050","display_name":"Augusta University","ror":"https://ror.org/012mef835","country_code":"US","type":"education","lineage":["https://openalex.org/I25041050"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Justin Henry","raw_affiliation_strings":["Augusta University, Augusta, Georgia, USA"],"raw_orcid":"https://orcid.org/0009-0001-6997-9718","affiliations":[{"raw_affiliation_string":"Augusta University, Augusta, Georgia, USA","institution_ids":["https://openalex.org/I25041050"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127840087","display_name":"Derek Richins","orcid":null},"institutions":[{"id":"https://openalex.org/I25041050","display_name":"Augusta University","ror":"https://ror.org/012mef835","country_code":"US","type":"education","lineage":["https://openalex.org/I25041050"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Derek Richins","raw_affiliation_strings":["Augusta University, Augusta, Georgia, USA"],"raw_orcid":"https://orcid.org/0009-0002-9206-0643","affiliations":[{"raw_affiliation_string":"Augusta University, Augusta, Georgia, USA","institution_ids":["https://openalex.org/I25041050"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032684706","display_name":"Steven G. Weldon","orcid":null},"institutions":[{"id":"https://openalex.org/I25041050","display_name":"Augusta University","ror":"https://ror.org/012mef835","country_code":"US","type":"education","lineage":["https://openalex.org/I25041050"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Steven G. Weldon","raw_affiliation_strings":["Augusta University, Augusta, Georgia, USA"],"raw_orcid":"https://orcid.org/0000-0001-6557-8442","affiliations":[{"raw_affiliation_string":"Augusta University, Augusta, Georgia, USA","institution_ids":["https://openalex.org/I25041050"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100567084","display_name":"Sumesh Kesavamoorthy Vijayalakshmi","orcid":null},"institutions":[{"id":"https://openalex.org/I25041050","display_name":"Augusta University","ror":"https://ror.org/012mef835","country_code":"US","type":"education","lineage":["https://openalex.org/I25041050"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sumesh Kesavamoorthy Vijayalakshmi","raw_affiliation_strings":["Augusta University, Augusta, Georgia, USA"],"raw_orcid":"https://orcid.org/0009-0003-3039-5859","affiliations":[{"raw_affiliation_string":"Augusta University, Augusta, Georgia, USA","institution_ids":["https://openalex.org/I25041050"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127809821","display_name":"Tim Price","orcid":null},"institutions":[{"id":"https://openalex.org/I25041050","display_name":"Augusta University","ror":"https://ror.org/012mef835","country_code":"US","type":"education","lineage":["https://openalex.org/I25041050"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tim Price","raw_affiliation_strings":["Augusta University, Augusta, Georgia, USA"],"raw_orcid":"https://orcid.org/0009-0004-9638-8608","affiliations":[{"raw_affiliation_string":"Augusta University, Augusta, Georgia, USA","institution_ids":["https://openalex.org/I25041050"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032393991","display_name":"Waylon Brunette","orcid":"https://orcid.org/0000-0001-8254-9440"},"institutions":[{"id":"https://openalex.org/I25041050","display_name":"Augusta University","ror":"https://ror.org/012mef835","country_code":"US","type":"education","lineage":["https://openalex.org/I25041050"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Waylon Brunette","raw_affiliation_strings":["Augusta University, Augusta, Georgia, USA"],"raw_orcid":"https://orcid.org/0000-0001-8254-9440","affiliations":[{"raw_affiliation_string":"Augusta University, Augusta, Georgia, USA","institution_ids":["https://openalex.org/I25041050"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I25041050"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37538839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"97","last_page":"102"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.3043000102043152,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.3043000102043152,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.26100000739097595,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.04670000076293945,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6769999861717224},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.5385000109672546},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.534500002861023},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.48420000076293945},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.44780001044273376},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.4300000071525574},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.41990000009536743},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3953000009059906},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.392300009727478}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6800000071525574},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6769999861717224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.583899974822998},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.5385000109672546},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.534500002861023},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5218999981880188},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.48420000076293945},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44780001044273376},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.4300000071525574},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.41990000009536743},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3953000009059906},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.392300009727478},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.37689998745918274},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.373199999332428},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.35850000381469727},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3221000134944916},{"id":"https://openalex.org/C2778701210","wikidata":"https://www.wikidata.org/wiki/Q28130034","display_name":"Constructive","level":3,"score":0.31200000643730164},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.3068000078201294},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.3001999855041504},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28929999470710754},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.2874999940395355},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.27950000762939453},{"id":"https://openalex.org/C203274722","wikidata":"https://www.wikidata.org/wiki/Q7001161","display_name":"Network performance","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.2669999897480011},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.262800008058548}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3789514.3792057","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3789514.3792057","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th International Workshop on Mobile Computing Systems and Applications","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3789514.3792057","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3789514.3792057","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th International Workshop on Mobile Computing Systems and Applications","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2009429512","https://openalex.org/W2095881341","https://openalex.org/W2570619149","https://openalex.org/W2789828921","https://openalex.org/W2976189582","https://openalex.org/W3014867074","https://openalex.org/W3165829082","https://openalex.org/W3195846920","https://openalex.org/W4285205927","https://openalex.org/W4292263371","https://openalex.org/W4311657401","https://openalex.org/W4390730117","https://openalex.org/W4390954673","https://openalex.org/W4391225283"],"related_works":[],"abstract_inverted_index":{"The":[0],"growth":[1],"of":[2,10,19,86,105,124,174],"mobile":[3,56],"devices,":[4],"edge":[5,89],"computing,":[6],"and":[7,27,58,72,111,128,195],"the":[8,17,39,125,142,147,186],"Internet":[9],"Things":[11],"(IoT)":[12],"has":[13],"heightened":[14],"concerns":[15],"about":[16],"effectiveness":[18],"traditional":[20],"perimeter-based":[21],"security":[22,32],"architectures":[23],"in":[24],"safeguarding":[25],"systems":[26,53],"critical":[28],"infrastructure.":[29],"Following":[30],"numerous":[31],"breaches,":[33],"a":[34,83,121,171],"significant":[35],"shift":[36],"toward":[37],"adopting":[38],"Zero":[40],"Trust":[41],"Architecture":[42],"(ZTA)":[43],"paradigm":[44],"is":[45,76,94],"underway.":[46],"Unfortunately,":[47],"adapting":[48],"cloud-based":[49,137],"ZTA":[50,100,126,138,161,193],"implementations":[51],"to":[52,96,107],"that":[54,61,101,133,159],"include":[55],"devices":[57],"remote":[59],"networks":[60,90],"experience":[62],"intermittent":[63],"connectivity":[64,75],"complicates":[65],"ZTA's":[66],"requirement":[67],"for":[68,188],"continuous,":[69],"per-request":[70],"authentication":[71],"authorization.":[73],"When":[74],"disrupted\u2014whether":[77],"intentional":[78],"or":[79],"accidental\u2014trust":[80],"verification":[81],"becomes":[82],"single":[84],"point":[85],"failure,":[87],"leaving":[88],"vulnerable.":[91],"Therefore,":[92],"research":[93,189],"needed":[95],"develop":[97],"an":[98,155],"availability-preserving":[99],"uses":[102],"local":[103],"sources":[104],"trust":[106,157,196],"mask":[108],"cloud":[109],"outages":[110],"support":[112],"responsive,":[113],"real-time":[114],"services.":[115],"In":[116],"this":[117],"paper,":[118],"we":[119,145],"provide":[120],"constructive":[122],"critique":[123],"tenets":[127],"examine":[129],"six":[130],"application":[131],"scenarios":[132],"highlight":[134],"complications":[135],"with":[136],"designs.":[139],"To":[140],"address":[141],"identified":[143],"complications,":[144],"propose":[146],"Wandering":[148],"Area":[149],"Network":[150],"Enhanced":[151],"Security":[152],"(WANES)":[153],"framework,":[154],"adaptive":[156],"model":[158],"enforces":[160],"paradigms":[162],"while":[163],"preserving":[164],"operational":[165],"availability":[166],"requirements.":[167],"We":[168],"also":[169],"conducted":[170],"preliminary":[172],"evaluation":[173],"existing":[175],"open-source":[176],"network":[177],"monitoring":[178,194],"solutions.":[179],"Initial":[180],"results":[181],"indicate":[182],"inadequate":[183],"performance,":[184],"highlighting":[185],"need":[187],"into":[190],"locally":[191],"deployed":[192],"components.":[197]},"counts_by_year":[],"updated_date":"2026-03-04T07:04:00.330322","created_date":"2026-03-03T00:00:00"}
