[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ITCC.2005.279guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Towards an Intrusion Detection System for Pervasive Computing Environments

Published: 04 April 2005 Publication History

Abstract

A pervasive computing environment consists of numerous casually accessible, frequently mobile, embedded, handheld devices capable of sensing the environment around it and reacting intelligently to simplify user activities. These devices are distributed everywhere at office, homes, stores, classroom, and are often connected to ad-hoc network and the internet providing access from anywhere and anytime. Access control mechanisms can sometimes fail to provide complete security to these pervasive computing devices as witnessed in infrastructure based networks. The addition of pervasive computing devices to infrastructure based networks makes the problem of intrusion detection even harder. In this paper, the challenges and characteristics of intrusion detection in pervasive computing devices are discussed along with a mobile agents-based solution for both for a network environment made up of infrastructure based network and pervasive computing devices.

Cited By

View all
  • (2008)A trust-based security system for ubiquitous and pervasive computing environmentsComputer Communications10.1016/j.comcom.2008.05.00731:18(4343-4351)Online publication date: 1-Dec-2008
  • (2007)A software-based trust framework for distributed industrial management systemsJournal of Systems and Software10.1016/j.jss.2007.01.04380:10(1621-1630)Online publication date: 1-Oct-2007

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ITCC '05: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
April 2005
817 pages
ISBN:0769523153

Publisher

IEEE Computer Society

United States

Publication History

Published: 04 April 2005

Author Tags

  1. Pervasive computing security
  2. and mobile agents
  3. intrusion detection

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2008)A trust-based security system for ubiquitous and pervasive computing environmentsComputer Communications10.1016/j.comcom.2008.05.00731:18(4343-4351)Online publication date: 1-Dec-2008
  • (2007)A software-based trust framework for distributed industrial management systemsJournal of Systems and Software10.1016/j.jss.2007.01.04380:10(1621-1630)Online publication date: 1-Oct-2007

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media