Survey Paper on Pervasive Computing for Mobile Security
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1
Abstract
Now a day, many applications rely on the existence of small devices that can exchange information and form communication networks. And it is very challenging to provide security for such application. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages based on Advance Encryption crypto graphic System that are directed to meet the requirements of mobile and pervasive applications. The encryption technique have the chance of the data misusing hence we add the password based authentication technique. By using Advance Encryption algorithm we are authenticating the message which is encrypted and we are improving the decryption speed and authentication accuracy to secure the communication the proposed message authentication technique is more efficient than the previous MAC algorithms and the aim of this proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives. It provides the security to the data. However it has high risk to the sender input data while the transmission to the receiver. The process will be evaluated in the real time scenario in terms of the networking environment. The performance will be evaluated in terms of the time complexity of the whole process.
Revisiting Defenses against Large-Scale Online Password Guessing Attacks
"Abstract: Brute force and dictionary attacks on password-only remote login services are now widespread and ever increasing rapidly in Day to day life. Enabling users convenient login for legitimate user...
Assessment of the Economic Impact of Full Scale use of Domestic Solar Water Heaters in Zimbabwe in Comparison with other Electrical Management Options
This research study investigates the possibility of solar energy replacing other sources of energy such as thermal and hydro electric energy in domestic water heaters. Other than it being a renewable and cheaper alternat...
The Real Time Monitoring of Water Quality in IoT Environment
In order to ensure the safe supply of the drinking water the quality needs to be monitor in real time. In this paper we present a design and development of a low cost system for real time monitoring of the water quality...
A Control Scheme of Cascaded Multilevel Inverter Based D-STATCOM for Improving the Voltage Control and Reduce Total Harmonics Distortion
This paper presents an investigation of Nine -Level Cascaded H - bridge (CHB) Inverter as Distribution Static Compensator (DSTATCOM) in Power System (PS) for compensation of reactive power and harmonics. The advantages o...
Biogenic Synthesis and Characterization of Selenium Nanoparticles Using the Flower of Bougainvillea spectabilis Willd
The present study reports that the flower of Bougainvillea spectabilis Willd. has the potentiality to reduce sodium selenate and synthesize selenium nanoparticles. The exposure of aqueous sodium selenate to the flower br...