Document Type
Article
Language
eng
Format of Original
14 p.
Publication Date
4-2008
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Source Publication
IEEE Transactions on Systems, Man, and Cybernetics
Source ISSN
0018-9472
Original Item ID
doi: 10.1109/TSMCC.2008.919182
Abstract
The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless connectivity will reach 2.6 billion units this year and 4 billion by 2010. More specifically, these handheld devices have become an integral part of industrial applications. These devices form pervasive ad hoc wireless networks that aide in industry applications. However, pervasive computing is susceptible and vulnerable to malicious active and passive snoopers. This is due to the unavoidable interdevice dependency, as well as a common shared medium, very transitory connectivity, and the absence of a fixed trust infrastructure. In order to ensure security and privacy in the pervasive environment, we need a mechanism to maintain a list of valid devices that will help to prevent malicious devices from participating in any task. In this paper, we will show the feasibility of using a modified human- computer authentication protocol in order to prevent the malicious attacks of ad hoc networks in industrial applications. We will also present two separate models for both large and small networks, as well as several possible attack scenarios for each network.
Recommended Citation
Haque, Munirul H. and Ahamed, Sheikh Iqbal, "An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications" (2008). Mathematics, Statistics and Computer Science Faculty Research and Publications. 308.
https://epublications.marquette.edu/mscs_fac/308
ADA Accessible Version
Comments
Accepted version. IEEE Transactions on Systems, Man, and Cybernetics, Vol. 38, No. 3 (April 2008): 334-346. DOI. © 2008 The Institute of Electrical and Electronics Engineers (IEEE). Used with permission.