An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

被引:1
|
作者
Jeong, Young-Sik [1 ]
Lee, Jae Dong [2 ]
Lee, Jeong-Bae [3 ]
Jung, Jai-Jin [4 ]
Park, Jong Hyuk [2 ]
机构
[1] Dongguk Univ, Dept Multimedia Engn, Seoul 100715, South Korea
[2] Seoul Natl Univ Sci & Technol, Dept Comp Sci & Engn, Seoul 139743, South Korea
[3] Sun Moon Univ, Dept Comp Engn, Asan 330150, South Korea
[4] Dankook Univ, Dept Multimedia Engn, Cheonan 330714, South Korea
关键词
D O I
10.1155/2014/198580
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs) are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS) is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users' temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT), which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain
    Kim, Hyun-Woo
    Jeong, Young-Sik
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2018, 8
  • [2] Human-Centric Computing
    Rabaey, Jan M.
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (01) : 3 - 11
  • [3] Human-Centric Computing
    Rabaey, Jan M.
    [J]. 2021 IEEE INTERNATIONAL ELECTRON DEVICES MEETING (IEDM), 2021,
  • [4] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Xiuqing Lu
    Zhenkuan Pan
    Hequn Xian
    [J]. Journal of Cloud Computing, 9
  • [5] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Lu, Xiuqing
    Pan, Zhenkuan
    Xian, Hequn
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [6] Overview of Human-Centric Computing
    Iida, Ichiro
    Morita, Toshihiko
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2012, 48 (02): : 124 - 128
  • [7] Host-based intrusion detection system for secure human-centric computing
    Daesung Moon
    Sung Bum Pan
    Ikkyun Kim
    [J]. The Journal of Supercomputing, 2016, 72 : 2520 - 2536
  • [8] Host-based intrusion detection system for secure human-centric computing
    Moon, Daesung
    Pan, Sung Bum
    Kim, Ikkyun
    [J]. JOURNAL OF SUPERCOMPUTING, 2016, 72 (07): : 2520 - 2536
  • [9] A Framework for Human-centric Personalization of Context Recognition Models on Mobile Devices
    Fujinami, Kaori
    Vu, Trang Thuy
    Sato, Koji
    [J]. IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 885 - 888
  • [10] Virtual workshops for human-centric computing
    Costabile, MF
    Fogli, D
    Fresta, G
    Mussio, P
    Piccinno, A
    [J]. 2004 IEEE SYMPOSIUM ON VISUAL LANGUAGES AND HUMAN CENTRIC COMPUTING: PROCEEDINGS, 2004, : 65 - 68