The computer for the 21st century
ACM SIGMOBILE Mobile Computing and Communications Review - Special issue dedicated to Mark Weiser
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection using autonomous agents
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
SPARTA, a Mobile Agent Based Instrusion Detection System
Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security
Indra: A peer-to-peer approach to network intrusion detection and prevention
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Simulation of Large-Scale Sensor Networks Using GTSNetS
MASCOTS '05 Proceedings of the 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
Personal and Ubiquitous Computing
Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents
DEPCOS-RELCOMEX '06 Proceedings of the International Conference on Dependability of Computer Systems
A wireless intrusion detection method based on neural network
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02
Intrusion Detection in Mobile Ad-Hoc Networks: A Mobile Agent Approach
ICIT '06 Proceedings of the 9th International Conference on Information Technology
A survey of trust and reputation systems for online service provision
Decision Support Systems
A Cost-Sensitive Model for Preemptive Intrusion Response Systems
AINA '07 Proceedings of the 21st International Conference on Advanced Networking and Applications
A Comparison of SYN Flood Detection Algorithms
ICIMP '07 Proceedings of the Second International Conference on Internet Monitoring and Protection
Stationary Distributions for the Random Waypoint Mobility Model
IEEE Transactions on Mobile Computing
A trust-based security architecture for ubiquitous computing systems
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Future Generation Computer Systems
Hi-index | 0.24 |
A service-oriented and user-centric intrusion detection system (SUIDS) is proposed in our previous work for a ubiquitous/pervasive computing network. The inherent features of ubiquitous computing request an IDS to give special concerns over the issue of resource-efficiency. In this paper, we present a comprehensive analysis of the resource constraints in SUIDS and propose a new method in order to reduce the resource consumptions. Specifically, the paper shows how a node's computing availability is measured by correlating with its energy usage; how a node's trust level is estimated based on multi-factors; and how a hybrid metric is used to balance these limited resources together. As a result, SUIDS achieves better performance in terms of resource efficiency with enhanced security.