Pervasive Computing Applications And Its Security Issues &Challenges
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: This paper discusses the emerging field of pervasive computing applications and its securitychallenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace,anywhere, at any time service to small or portable and wearable devices. This technology create newopportunities and challenges for the Information Technology companies to place high-performance computersand sensors in virtually every device, appliance, and piece of equipment in buildings, home care,Intelligenttransport system, workplaces, and factories, and even in clothing. Pervasive computing environment or PCEshare most of the security issues of traditional networked applications. These include authentication of devicesand users, privacy of data or information, defense against malicious code such as viruses, worms, Trojan horsesetc, and access control mechanisms. Finally it describes about the future focus for the pervasive computingthrough the real time applications
Authors and Affiliations
R. UMA
DIP Using Image Encryption and XOR Operation AffineTransform
Abstract: Digital image processing is the use of computer algorithms to perform image processing on digitalimages. It is a subfield of digital signal processing. Digital image processing has many advantages over an...
A web-based Child vaccination system in Bangladesh
Vaccination is the way of prevention from various infectious diseases. It stimulates the immune system against a pathogen. In many developed countries, the process of Vaccination system is not technology based. In Bangla...
Steganography Techniques Used To Hide the Information
Steganography is a technique for hiding data behind the file such as image, audio, video etc. and that data securely transfer from sender to receiver. It serves as a better way of securing message than cryptography which...
Simulation of Parallel and Distributed Computing: A Review
Abstract : Parallel and Distributed Computing has made it possible to simulate large infrastructures like Telecom networks, air traffic etc. in an easy and effective way. It not only makes the processes faster and reliab...
Comparative analysis of Stegnography Algorithms on the Basis of PSNR value & cover file size
Abstract: With the rapid growth in the field of technology, there is always a requirement of development of fast and secure algorithms. Steganography is used to provide confidentiality over the transmitted data or...