Document Type

Conference Proceeding

Language

eng

Format of Original

6 p.

Publication Date

4-2005

Publisher

Institute of Electrical and Electronics Engineers (IEEE)

Source Publication

International Conference on Information Technology: Coding and Computing

Source ISSN

0-7695-2315-3

Original Item ID

doi: 10.1109/ITCC.2005.279

Abstract

A pervasive computing environment consists of numerous casually accessible, frequently mobile, embedded, handheld devices capable of sensing the environment around it and reacting intelligently to simplify user activities. These devices are distributed everywhere at office, homes, stores, classroom, and are often connected to ad-hoc network and the Internet providing access from anywhere and anytime. Access control mechanisms can sometimes fail to provide complete security to these pervasive computing devices as witnessed in infrastructure based networks. The addition of pervasive computing devices to infrastructure based networks makes the problem of intrusion detection even harder. In this paper, the challenges and characteristics of intrusion detection in pervasive computing devices are discussed along with a mobile agents-based solution for both for a network environment made up of infrastructure based network and pervasive computing devices.

Comments

Accepted version. Published as part of the proceedings of the conference, International Conference on Information Technology: Coding and Computing, 2005: 277-282. DOI. © 2005 The Institute of Electrical and Electronics Engineers. Used with permission.

ahamed_7738acc.docx (242 kB)
ADA Accessible Version

Share

COinS