Using Battery Constraints within Mobile Hosts to Improve Network Security

Distributed battery-based intrusion detection (B-BID) is an efficacious early-warning system that can complement existing intrusion detection systems (IDSs) by alerting users to protect their mobile devices as well as network administrators to protect their corporate networks by correlating device power consumption with application and attack activity data

[1]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[2]  Kang G. Shin,et al.  Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[3]  Grant A. Jacoby,et al.  Battery-based intrusion detection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[4]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[5]  K. C. Syracuse,et al.  A statistical approach to domain performance modeling for oxyhalide primary lithium batteries , 1997, The Twelfth Annual Battery Conference on Applications and Advances.

[6]  Giovanni Vigna,et al.  An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[7]  T. Champion,et al.  A benchmark evaluation of network intrusion detection systems , 2001, 2001 IEEE Aerospace Conference Proceedings (Cat. No.01TH8542).

[8]  Massoud Pedram,et al.  Design considerations for battery-powered electronics , 1999, Proceedings 1999 Design Automation Conference (Cat. No. 99CH36361).

[9]  Cannady,et al.  A Comparative Analysis of Current Intrusion Detection Technologies , 1996 .

[10]  Michael S. Hsiao,et al.  Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[11]  G.A. Jacoby,et al.  Battery-based intrusion detection a first line of defense , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[12]  Philip Koopman,et al.  Embedded System Security , 2004, Computer.