Pervasive Computing Applications And Its Security Issues &Challenges

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3

Abstract

 Abstract: This paper discusses the emerging field of pervasive computing applications and its securitychallenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace,anywhere, at any time service to small or portable and wearable devices. This technology create newopportunities and challenges for the Information Technology companies to place high-performance computersand sensors in virtually every device, appliance, and piece of equipment in buildings, home care,Intelligenttransport system, workplaces, and factories, and even in clothing. Pervasive computing environment or PCEshare most of the security issues of traditional networked applications. These include authentication of devicesand users, privacy of data or information, defense against malicious code such as viruses, worms, Trojan horsesetc, and access control mechanisms. Finally it describes about the future focus for the pervasive computingthrough the real time applications

Authors and Affiliations

R. UMA

Keywords

Related Articles

 DIP Using Image Encryption and XOR Operation AffineTransform

 Abstract: Digital image processing is the use of computer algorithms to perform image processing on digitalimages. It is a subfield of digital signal processing. Digital image processing has many advantages over an...

A web-based Child vaccination system in Bangladesh

Vaccination is the way of prevention from various infectious diseases. It stimulates the immune system against a pathogen. In many developed countries, the process of Vaccination system is not technology based. In Bangla...

Steganography Techniques Used To Hide the Information

Steganography is a technique for hiding data behind the file such as image, audio, video etc. and that data securely transfer from sender to receiver. It serves as a better way of securing message than cryptography which...

Simulation of Parallel and Distributed Computing: A Review

Abstract : Parallel and Distributed Computing has made it possible to simulate large infrastructures like Telecom networks, air traffic etc. in an easy and effective way. It not only makes the processes faster and reliab...

 Comparative analysis of Stegnography Algorithms on the Basis of PSNR value & cover file size

 Abstract: With the rapid growth in the field of technology, there is always a requirement of development of fast and secure algorithms. Steganography is used to provide confidentiality over the transmitted data or...

Download PDF file
  • EP ID EP95065
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

R. UMA (2015).  Pervasive Computing Applications And Its Security Issues &Challenges. IOSR Journals (IOSR Journal of Computer Engineering), 17(3), 86-93. https://europub.co.uk/articles/-A-95065