Document Type

Conference Proceeding



Format of Original

6 p.

Publication Date



Institute of Electrical and Electronics Engineers (IEEE)

Source Publication

International Conference on Information Technology: Coding and Computing

Source ISSN


Original Item ID

doi: 10.1109/ITCC.2005.279


A pervasive computing environment consists of numerous casually accessible, frequently mobile, embedded, handheld devices capable of sensing the environment around it and reacting intelligently to simplify user activities. These devices are distributed everywhere at office, homes, stores, classroom, and are often connected to ad-hoc network and the Internet providing access from anywhere and anytime. Access control mechanisms can sometimes fail to provide complete security to these pervasive computing devices as witnessed in infrastructure based networks. The addition of pervasive computing devices to infrastructure based networks makes the problem of intrusion detection even harder. In this paper, the challenges and characteristics of intrusion detection in pervasive computing devices are discussed along with a mobile agents-based solution for both for a network environment made up of infrastructure based network and pervasive computing devices.


Accepted version. Published as part of the proceedings of the conference, International Conference on Information Technology: Coding and Computing, 2005: 277-282. DOI. © 2005 The Institute of Electrical and Electronics Engineers. Used with permission.

ahamed_7738acc.docx (242 kB)
ADA Accessible Version