Towards an intrusion detection system for pervasive computing environments

被引:8
作者
Kannadiga, P [1 ]
Zulkernine, M [1 ]
Ahamed, SI [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON K7L 3N6, Canada
来源
ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2 | 2005年
关键词
pervasive computing security; intrusion detection; mobile agents;
D O I
10.1109/ITCC.2005.279
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A pervasive computing environment consists Of numerous casually accessible, frequently mobile, embedded, handheld devices capable of sensing the environment around it and reacting intelligently to simplify user activities. These devices are distributed everywhere at office, homes, stores, classroom, and are often connected to ad-hoc network and the internet providing access from anywhere and anytime. Access control mechanisms can sometimes fail to provide complete security to these pervasive computing devices as witnessed in infrastructure based networks. The addition of pervasive computing devices to infrastructure based networks makes the problem of intrusion detection even harder. In this paper, the challenges and characteristics of intrusion detection in pervasive computing devices are discussed along with a mobile agents-based solution for both for a network environment made up of infrastructure based network and pervasive computing devices.
引用
收藏
页码:277 / 282
页数:6
相关论文
共 19 条
[1]  
ASAKA M, 1999, INET 99 SAN JOS US J
[2]  
Bergenti F., 2001, LEAP FIPA PLATFORM H
[3]  
FOUKIA N, 2001, P 11 ANN INT SOC C I
[4]   Intelligent agents for intrusion detection [J].
Helmer, GG ;
Wong, JSK ;
Honavar, V ;
Miller, L .
1998 IEEE INFORMATION TECHNOLOGY CONFERENCE, PROCEEDINGS, 1998, :121-124
[5]  
KAGAL L, 2002, P G HOPP CEL WOM COM
[6]  
KANNADIGA P, 2005, 3 INT WORKSH INT COM
[7]  
KO D, 1993, P 1 ACM C COMP COMM
[8]  
LAUKKANEN M, AGENTS MOBILE DEVICE
[9]  
RANGANATHAN K, 2004, P 1 IEEE INT WORKSH
[10]  
RANKIN DB, 2004, HANDHELD COMPUTER SE