Survey Paper on Pervasive Computing for Mobile Security

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1

Abstract

Now a day, many applications rely on the existence of small devices that can exchange information and form communication networks. And it is very challenging to provide security for such application. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages based on Advance Encryption crypto graphic System that are directed to meet the requirements of mobile and pervasive applications. The encryption technique have the chance of the data misusing hence we add the password based authentication technique. By using Advance Encryption algorithm we are authenticating the message which is encrypted and we are improving the decryption speed and authentication accuracy to secure the communication the proposed message authentication technique is more efficient than the previous MAC algorithms and the aim of this proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives. It provides the security to the data. However it has high risk to the sender input data while the transmission to the receiver. The process will be evaluated in the real time scenario in terms of the networking environment. The performance will be evaluated in terms of the time complexity of the whole process.

Authors and Affiliations

Keywords

Related Articles

Review of Multi-objective Evolutionary Algorithm

Datamining is an analytic process designed to explore data in search of consistent patterns and/or systematic relationships between variables, and then to validate the findings by applying the detected patterns to new su...

Full Halo Coronal Mass Ejection and Cosmic Ray Intensity

In this work we have studied the effect of different types of full halo Coronal Mass Ejection on the cosmic ray intensity for the period of 1996-2004. It is found that the cosmic ray intensity depressed to minimum after...

Assessment and Implementation of Cleaner Production Practices in Petroleum Lubricants Industry Value Chain in Zimbabwe

This paper is a study of Cleaner Production Assessment in the Petroleum Lubricants Industry value chain done in Zimbabwe. It focuses on opportunities available to reduce negative environmental impacts of lubricants throu...

Implementation of Wireless Sensor Network for Real Time Monitoring of Agricultural Parameter

Present paper objective is to develop a smart wireless sensor network (WSN) for an agricultural environment. Monitoring agricultural environment for various factors such as soil moisture, temperature and humidity along w...

Enhancing Environmental Efficiency through use of Cleaner Production Technology in the Fertilizer Production Industry: A Case Study of FertCo in Zimbabwe

This research study investigates processes involved in the production of fertilizers and seeks to highlight the opportunities available to use Cleaner Production technology to improve on input resource efficiency, reduct...

Download PDF file
  • EP ID EP340096
  • DOI -
  • Views 62
  • Downloads 0

How To Cite

(2015). Survey Paper on Pervasive Computing for Mobile Security. International Journal of Science and Research (IJSR), 4(1), -. https://europub.co.uk/articles/-A-340096