Pervasive Computing Applications And Its Security Issues &Challenges

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3

Abstract

 Abstract: This paper discusses the emerging field of pervasive computing applications and its securitychallenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace,anywhere, at any time service to small or portable and wearable devices. This technology create newopportunities and challenges for the Information Technology companies to place high-performance computersand sensors in virtually every device, appliance, and piece of equipment in buildings, home care,Intelligenttransport system, workplaces, and factories, and even in clothing. Pervasive computing environment or PCEshare most of the security issues of traditional networked applications. These include authentication of devicesand users, privacy of data or information, defense against malicious code such as viruses, worms, Trojan horsesetc, and access control mechanisms. Finally it describes about the future focus for the pervasive computingthrough the real time applications

Authors and Affiliations

R. UMA

Keywords

Related Articles

 Methods of Gathering Data for Research Purpose and  Applications Using IJSER Acceptance Rate of Monthly Paper  Publication (March 2012 Edition-May 2013 Edition)

 A good number of scientist or researchers find it very difficult in carrying out their research work successfully due to lack of good knowledge of data collection method and application. Data is referred to as a...

 Next Generation Genetic Algorithm for Maximum Clique Problem

 Abstract: Given a graph, in the maximum clique problem, one desires to find the largest number of vertices, any two of which are adjacent. A branch-and-bound algorithm for the maximum clique problem—which is comput...

 Cloud Computing: Environment of Next Generation Technology

 Abstract: Cloud computing is the convergence of virtualization, Distributed Applications, Grid, Maturity of enterprise software application and enterprise IT Management. It is a tremendously attractive technology a...

 Computational Intelligence Methods for Clustering of SenseTagged Nepali Documents

 Abstract: This paper presents a method using hybridization of self organizing map (SOM ), particle swarmoptimization(PSO) and k-means clustering algorithm for document clustering. Document representation is animpor...

 Uncompressed Image Steganography using BPCS: Survey and  Analysis

 Steganography is the art and science of hide secret information in some carrier data without leaving any apparent evidence of data alternation. In the past, people use hidden tattoos, invisible ink or punching on...

Download PDF file
  • EP ID EP95065
  • DOI -
  • Views 122
  • Downloads 0

How To Cite

R. UMA (2015).  Pervasive Computing Applications And Its Security Issues &Challenges. IOSR Journals (IOSR Journal of Computer Engineering), 17(3), 86-93. https://europub.co.uk/articles/-A-95065