Abstract
Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs) are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS) is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. Them-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application ofm-IPS to the Internet of things (IoT), which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.
Highlights
Rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military
We extend traditional access control model that helps organizations to know which user can perform what operation on which object with what purpose
The method proposed by Chen et al improved false-positive rates using signature detection and planned recognition-based wireless intrusion prevention systems (IPSs) but did not consider information on temporal-spatial elements and roles
Summary
Rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. The increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Solutions such as intrusion prevention systems (IPSs), instruction detection systems (IDSs), and firewalls are used to prevent illegal external access. Wireless IPSs are used to reinforce security against accessing mobile devices. Wireless IPSs have been developed to prevent security threats that may occur in wireless environments. They are vulnerable to attack because they use pattern-based engines to detect potential attacks. The same rules cannot be applied to all mobile business devices because of considerations of time, space, and individual roles [1, 2]
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have