Document Type

Article

Language

eng

Format of Original

14 p.

Publication Date

4-2008

Publisher

Institute of Electrical and Electronics Engineers (IEEE)

Source Publication

IEEE Transactions on Systems, Man, and Cybernetics

Source ISSN

0018-9472

Original Item ID

doi: 10.1109/TSMCC.2008.919182

Abstract

The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless connectivity will reach 2.6 billion units this year and 4 billion by 2010. More specifically, these handheld devices have become an integral part of industrial applications. These devices form pervasive ad hoc wireless networks that aide in industry applications. However, pervasive computing is susceptible and vulnerable to malicious active and passive snoopers. This is due to the unavoidable interdevice dependency, as well as a common shared medium, very transitory connectivity, and the absence of a fixed trust infrastructure. In order to ensure security and privacy in the pervasive environment, we need a mechanism to maintain a list of valid devices that will help to prevent malicious devices from participating in any task. In this paper, we will show the feasibility of using a modified human- computer authentication protocol in order to prevent the malicious attacks of ad hoc networks in industrial applications. We will also present two separate models for both large and small networks, as well as several possible attack scenarios for each network.

Comments

Accepted version. IEEE Transactions on Systems, Man, and Cybernetics, Vol. 38, No. 3 (April 2008): 334-346. DOI. © 2008 The Institute of Electrical and Electronics Engineers (IEEE). Used with permission.

ahamed_7613acc.docx (694 kB)
ADA Accessible Version

Share

COinS