版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Department of Computer Science A/Mira University of Bejaiaa Algeria Applied Mathematics Laboratory A/Mira University of Bejaia Algeria Modeling and Optimization Systems Laboratory University of Bejaia Algeria CITDR Tiako University Oklahoma USA
出 版 物:《Procedia Computer Science》 (计算机科学会议集)
年 卷 期:2016年第94卷第0期
页 面:429-434页
学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)]
主 题:Ubiquitous computing Intrusion detection system (IDS) Security Trust
摘 要:Ubiquitous system returns to making pervasive computing in everyday life, the objects of our environments become intelligent and communicate without anyone being aware of their communication processes Ubiquitous computing adds the concept of mobility to the notion of omnipresence; therefore, it makes reference to moving intelligent objects (from mobile computing) that can communicate with other ubiquitous objects in our daily lives These advantages expose the network to malicious and unauthorized activities The security of these networks, targeted by attackers, is an important issue For this, Intrusion Detection Systems (IDSs) have been widely discussed for solving networks intrusions problems Several solutions have been adopted to overcome these kinds of intrusion These IDS solutions are insufficient and/or incomplete because they are based on centralized devises, and did not consider the heterogeneity and mobility nature of these devices, which is the case for ubiquitous environments We developed a new IDS approach to support security problems in ubiquitous network The approach proposed is based on nodes authentication abilities for preventing inside and outside ubiquitous network intrusion.