Personal Firewall for Pocket PC 2003: Design & Implementation
نویسندگان
چکیده
Personal digital assistants (PDAs) are widely used and becoming indispensable tools of everyday life. Wired or wireless connection enables PDA users to connect to the Internet from any place, making security an extremely important issue in a pervasive computing environment. This paper investigates how to build a personal firewall for PDAs running Pocket PC 2003. This personal firewall allows the PDA user to perform access control based on a user-defined policy, and hence provides a security perimeter between the public network and the PDA. We provide a complete technical detail on how the firewall can be built in a Pocket PC 2003 device. To the best of our knowledge, this is the first design and implementation of personal firewalls for Pocket PC 2003 device which is explicit, open source and successfully implemented in any Pocket PC 2003 compatible devices, including HP iPaq H5550 and XDA2 02 smart phone. Disciplines Physical Sciences and Mathematics Publication Details This article was published as: Susilo, W, Ang, RJ, McDonald, CAG & Huang, J, Personal firewall for Pocket PC 2003: design & implementation, Proceedings 19th International Conference on Advanced Information Networking and Applications, 28-30 March 2005, vol 2, 661-666. Copyright IEEE 2003. This conference paper is available at Research Online: http://ro.uow.edu.au/infopapers/123 Personal for Pocket PC 2003: Design Implementation Willy Susilo, Russell James Ang, Cameron Allen George McDonald, and Jianyong Huang University of Wollongong, Australia
منابع مشابه
Design and Implementation of Personal Firewalls for Handheld Devices
Personal Digital Assitants (PDAs) have become one of the important tools in our life. Their popularity are due to their small size and mobility which enable them to be carried anywhere. Along with their popularity, handheld devices are starting to become the target for the attackers, who are mainly interested in gaining the data stored in handheld devices. Therefore, security of handheld device...
متن کاملPractical Implementation of Scalar and Vector Control Methods on a Rotor Surface Type Permanent Magnent Synchronous Machine Drive/System Using a PC
In this paper, using a personal computer (PC), the practical implementation of scalar and vector control methods on a three–phase rotor surface- type permanent magnet synchronous machine drive is discussed. Based on the machine dynamic equations and the above control strategies, two block diagrams are presented first for closed-loop speed controlling of the machine drive/system. Then, the desig...
متن کاملPractical Implementation of Scalar and Vector Control Methods on a Rotor Surface Type Permanent Magnent Synchronous Machine Drive/System Using a PC
In this paper, using a personal computer (PC), the practical implementation of scalar and vector control methods on a three–phase rotor surface- type permanent magnet synchronous machine drive is discussed. Based on the machine dynamic equations and the above control strategies, two block diagrams are presented first for closed-loop speed controlling of the machine drive/system. Then, the desig...
متن کاملDesigning and Implementing a MANET Network Service Interface with Compact .NET on Pocket PC
Operators forming an ad hoc network (MANET) in emergency situations would benefit from software supporting their interaction. To date, however, development of such a coordination layer has required abstractions on the services and data provided by the lower network layers. In this paper we present the design and a possible implementation of the Network Service Interface [DeRosa03a] as a .NET Co...
متن کاملDesign and Performance of Firewall System Based on Embedded Computing
Conventional firewall has failed to resist the attack from the inside network and distributed firewall excessively relies on the host operation system, therefore embedded firewall become the focus of the current network security research. The paper discusses the design and implementation of firewall system based on embedded computing. In addition, it presents architecture of embedded firewall, ...
متن کامل