location privacy concerns. Location conveys a rich set of
potentially private contextual information. Even if devices
are only identified by pseudonymous addresses, an
adversary could learn the user’s identity if the location is
linkable to publicly available, identified location records.
For example, if a query originates from a car on a
suburban driveway, the likely household could be
identified by looking at a public address database. The
location architecture should incorporate privacy
mechanisms across all layers to address location privacy
concerns.
IV. CONCLUSION
Wireless, mobile and sensor networks represent an
increasingly important segment of networking research as
a whole, driven by the explosive growth of portable
computing, communication and embedded devices
connected to the Internet. Mobile agents appear to be an
interesting way to exploit synergies between current
research on network management and agent-related
research. While network management looks for new ways
to overcome the limitations of current client-server
technology, mobile agents and peer computing provide
technologies and architectures to enable de-central, peerto-peer communication. In future, all cell phones will be
full-fledged Internet devices, implying inevitable changes
both in applications and network infrastructure to support
mobility, location-awareness and processing/bandwidth
limitations associated with this class of end-user terminals.
Wireless technology will be a greater progress and widely
used in the world.
ACKNOWLEDGMENT
This work is partially supported by the Scientific
Research Common Program of Beijing Municipal
Commission of Education #KM200811417011, Funding
Project for Academic Human Resources Development in
Institutions of Higher Learning Under the Jurisdiction of
Beijing Municipality, PHR (IHLB), and the Young Key
Teacher Program of Beijing Municipal Commission of
Education. Thanks for the help.