Towards an intrusion detection system for pervasive computing environments

P. Kannadiga, M. Zulkernine, S.I. Ahamed
2005 International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II  
A pervasive computing environment consists of numerous casually accessible, frequently mobile, embedded, handheld or portable smart devices capable of sensing the environment around it and reacting intelligently to simplify user activities. These devices are distributed everywhere at office, homes, stores, classroom, and are often connected to ad-hoc network and the Internet providing access to any computing resource and services from anywhere and anytime. Access control mechanisms can
more » ... fail to provide complete security to these pervasive computing devices as witnessed in infrastructure based networks. Often these pervasive computing devices are connected to infrastructure based networks like office LAN. This makes the pervasive computing devices also vulnerable to the same type of attacks as on infrastructure based networks. Hence, there arises the need for intrusion detection systems capable of operating both in infrastructure based networks and the ad-hoc networks of pervasive computing devices. Much of the research on intrusion detection has been carried out in the field of infrastructure based networks. The addition of pervasive computing devices to infrastructure based networks makes the problem of intrusion detection even harder. In this paper, the challenges and characteristics of intrusion detection in pervasive computing devices are discussed. The paper also describes the detailed architecture of an intrusion detection system using mobile agents for a network environment made up of infrastructure based network and pervasive computing devices.
doi:10.1109/itcc.2005.279 dblp:conf/itcc/KannadigaZA05 fatcat:pgzv7fcj6zbrdauch4ugy3tcfa