Personal Firewall for Pocket PC 2003: Design & Implementation

نویسندگان

  • Willy Susilo
  • Russell James Ang
  • Cameron Allen George McDonald
  • Jianyong Huang
چکیده

Personal digital assistants (PDAs) are widely used and becoming indispensable tools of everyday life. Wired or wireless connection enables PDA users to connect to the Internet from any place, making security an extremely important issue in a pervasive computing environment. This paper investigates how to build a personal firewall for PDAs running Pocket PC 2003. This personal firewall allows the PDA user to perform access control based on a user-defined policy, and hence provides a security perimeter between the public network and the PDA. We provide a complete technical detail on how the firewall can be built in a Pocket PC 2003 device. To the best of our knowledge, this is the first design and implementation of personal firewalls for Pocket PC 2003 device which is explicit, open source and successfully implemented in any Pocket PC 2003 compatible devices, including HP iPaq H5550 and XDA2 02 smart phone. Disciplines Physical Sciences and Mathematics Publication Details This article was published as: Susilo, W, Ang, RJ, McDonald, CAG & Huang, J, Personal firewall for Pocket PC 2003: design & implementation, Proceedings 19th International Conference on Advanced Information Networking and Applications, 28-30 March 2005, vol 2, 661-666. Copyright IEEE 2003. This conference paper is available at Research Online: http://ro.uow.edu.au/infopapers/123 Personal for Pocket PC 2003: Design Implementation Willy Susilo, Russell James Ang, Cameron Allen George McDonald, and Jianyong Huang University of Wollongong, Australia

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Implementation of Personal Firewalls for Handheld Devices

Personal Digital Assitants (PDAs) have become one of the important tools in our life. Their popularity are due to their small size and mobility which enable them to be carried anywhere. Along with their popularity, handheld devices are starting to become the target for the attackers, who are mainly interested in gaining the data stored in handheld devices. Therefore, security of handheld device...

متن کامل

Practical Implementation of Scalar and Vector Control Methods on a Rotor Surface Type Permanent Magnent Synchronous Machine Drive/System Using a PC

In this paper, using a personal computer (PC), the practical implementation of scalar and vector control methods on a three–phase rotor surface- type permanent magnet synchronous machine drive is discussed. Based on the machine dynamic equations and the above control strategies, two block diagrams are presented first for closed-loop speed controlling of the machine drive/system. Then, the desig...

متن کامل

Practical Implementation of Scalar and Vector Control Methods on a Rotor Surface Type Permanent Magnent Synchronous Machine Drive/System Using a PC

In this paper, using a personal computer (PC), the practical implementation of scalar and vector control methods on a three–phase rotor surface- type permanent magnet synchronous machine drive is discussed. Based on the machine dynamic equations and the above control strategies, two block diagrams are presented first for closed-loop speed controlling of the machine drive/system. Then, the desig...

متن کامل

Designing and Implementing a MANET Network Service Interface with Compact .NET on Pocket PC

Operators forming an ad hoc network (MANET) in emergency situations would benefit from software supporting their interaction. To date, however, development of such a coordination layer has required abstractions on the services and data provided by the lower network layers. In this paper we present the design and a possible implementation of the Network Service Interface [DeRosa03a] as a .NET Co...

متن کامل

Design and Performance of Firewall System Based on Embedded Computing

Conventional firewall has failed to resist the attack from the inside network and distributed firewall excessively relies on the host operation system, therefore embedded firewall become the focus of the current network security research. The paper discusses the design and implementation of firewall system based on embedded computing. In addition, it presents architecture of embedded firewall, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005