Journal of Applied Mathematics

  • J. Appl. Math.
  • Volume 2014, Special Issue (2014), Article ID 198580, 8 pages.

An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

Young-Sik Jeong, Jae Dong Lee, Jeong-Bae Lee, Jai-Jin Jung, and Jong Hyuk Park

Full-text: Open access

Abstract

Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs) are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS) is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT), which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

Article information

Source
J. Appl. Math., Volume 2014, Special Issue (2014), Article ID 198580, 8 pages.

Dates
First available in Project Euclid: 1 October 2014

Permanent link to this document
https://projecteuclid.org/euclid.jam/1412176996

Digital Object Identifier
doi:10.1155/2014/198580

Citation

Jeong, Young-Sik; Lee, Jae Dong; Lee, Jeong-Bae; Jung, Jai-Jin; Park, Jong Hyuk. An Efficient and Secure m -IPS Scheme of Mobile Devices for Human-Centric Computing. J. Appl. Math. 2014, Special Issue (2014), Article ID 198580, 8 pages. doi:10.1155/2014/198580. https://projecteuclid.org/euclid.jam/1412176996


Export citation

References

  • G. Chen, H. Yao, and Z. Wang, “An intelligent WLAN intrusion prevention system based on signature detection and plan recognition,” in Proceedings of the 2nd International Conference on Future Networks (ICFN '10), pp. 168–172, January 2010.
  • E. Georgakakis, S. A. Nikolidakis, D. D. Vergados, and C. Douligeris, “Spatio temporal emergency role based access control (STEM-RBAC): a time and location aware role based access control model with a break the glass mechanism,” in Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC '11), pp. 764–770, July 2011.
  • R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, “Computer role-based access control models,” IEEE Computer Society, vol. 29, no. 2, pp. 38–47, 1996.
  • X. Zhou, Y. Ge, X. Chen, Y. Jing, and W. Sun, “A distributed cache based reliable service execution and recovery approach in MANETs,” Journal of ConvergenceNo, vol. 3, no. 1, pp. 5–12, 2012.
  • A. U. Bandaranayake, V. Pandit, and D. P. Agrawal, “Indoor link quality comparison of IEEE 802. 11a channels in a multi-radio Mesh network testbed,” Journal of Information Processing Systems, vol. 8, no. 1, pp. 1–20, 2012.
  • M. Nyanchama and S. Osborn, “The role graph model and conflict of interest,” ACM Transactions on Information and System Security, vol. 2, no. 1, pp. 3–33, 1999.
  • S. Silas, K. Ezra, and E. B. Rajsingh, “A novel fault tolerant ser-vice selection framework for pervasive computing,” Human-Centric Computing and Information Sciences, vol. 2, no. 5, pp. 1–14, 2012.
  • M. S. Kirkpatrick, G. Ghinita, and E. Bertino, “Privacy-preserving enforcement of spatially aware RBAC,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 5, pp. 627–640, 2012.
  • J. Timofte, “Wireless intrusion prevention system,” Revista Informatica Economica, vol. 47, pp. 129–132, 2008.
  • Y. Zhang, G. Chen, W. Weng, and Z. Wang, “An overview of wireless intrusion prevention systems,” in Proceedings of the 2nd International Conference on Communication Systems, Networks and Applications (ICCSNA '10), pp. 147–150, July 2010.
  • W. Hsieh, C. Lo, J. Lee, and L. Huang, “The implementation of a proactive wireless intrusion detection system,” in Proceedings of the 4th International Conference on Computer and Information Technology (CIT '04), pp. 581–586, IEEE Press, September 2004.
  • M. N. Tahir, “C-RBAC: contextual role-based access control model,” Ubiquitous Computing and Communication Journal, vol. 2, no. 3, pp. 67–74, 2007.
  • D. Lijun, Y. Shengsheng, X. Tao, and L. Rongtao, “WBIPS: a lightweight WTLS-based intrusion prevention scheme,” in Pro-ceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2298–2301, IEEE Press, September 2007.
  • A. Vartak, S. Ahmad, and K. N. Gopinath, “An experimental evaluation of Over-The-Air (OTA) wireless intrusion prevention techniques,” in Proceedings of the 2nd International Conference on Communication Systems Software and Middleware, pp. 1–7, IEEE Computer Society, January 2007.
  • G. Chen, H. Yao, and Z. Wang, “Research of wireless intrusion prevention systems based on plan recognition and honeypot,” in Proceedings of the International Conference on Wireless Communications and Signal Processing (WCSP '09), pp. 1–5, IEEE Computer Society, November 2009.
  • D. Zou, L. He, H. Jin, and X. Chen, “CRBAC: imposing multi-grained constraints on the RBAC model in the multi-application environment,” Journal of Network and Computer Applications, vol. 32, no. 2, pp. 402–411, 2009. \endinput