Article ID Journal Published Year Pages File Type
570540 Procedia Computer Science 2016 6 Pages PDF
Abstract

Ubiquitous system returns to making pervasive computing in everyday life, the objects of our environments become intelligent and communicate without anyone being aware of their communication processes Ubiquitous computing adds the concept of mobility to the notion of omnipresence; therefore, it makes reference to moving intelligent objects (from mobile computing) that can communicate with other ubiquitous objects in our daily lives These advantages expose the network to malicious and unauthorized activities The security of these networks, targeted by attackers, is an important issue For this, Intrusion Detection Systems (IDSs) have been widely discussed for solving networks intrusions problems Several solutions have been adopted to overcome these kinds of intrusion These IDS solutions are insufficient and/or incomplete because they are based on centralized devises, and did not consider the heterogeneity and mobility nature of these devices, which is the case for ubiquitous environments We developed a new IDS approach to support security problems in ubiquitous network The approach proposed is based on nodes authentication abilities for preventing inside and outside ubiquitous network intrusion.

Related Topics
Physical Sciences and Engineering Computer Science Computer Science (General)
Authors
, , , ,