Survey Paper on Pervasive Computing for Mobile Security

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1

Abstract

Now a day, many applications rely on the existence of small devices that can exchange information and form communication networks. And it is very challenging to provide security for such application. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages based on Advance Encryption crypto graphic System that are directed to meet the requirements of mobile and pervasive applications. The encryption technique have the chance of the data misusing hence we add the password based authentication technique. By using Advance Encryption algorithm we are authenticating the message which is encrypted and we are improving the decryption speed and authentication accuracy to secure the communication the proposed message authentication technique is more efficient than the previous MAC algorithms and the aim of this proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives. It provides the security to the data. However it has high risk to the sender input data while the transmission to the receiver. The process will be evaluated in the real time scenario in terms of the networking environment. The performance will be evaluated in terms of the time complexity of the whole process.

Authors and Affiliations

Keywords

Related Articles

Design and Development of Model Predictive Controller for Binary Distillation Column

Model Predictive Control (MPC) is an advanced process control technique used in process related industries that can predict the future behavior of the process state/output over the finite time horizon by predicting the c...

A Relative Comparison between BAP and JSSP using Two Heuristics AFSA and ACO

A Relative Comparison between BAP and JSSP using Two Heuristics AFSA and ACO

Inclined Slider Bearing Under the Effects of Second Order Rotatory Theory of Hydrodynamic Lubrication

The second order rotatory theory of hydrodynamic lubrication was founded on the expression obtained by retaining the terms containing first and second powers of rotation number in the extended generalized Reynolds equati...

Study of Management of Solitary Thyroid Nodule

Study of Management of Solitary Thyroid Nodule

Production and Supply of Regional Food Products – Incentives and Challenges for the Small Holdings in Bulgaria

There are numerous studies investigating consumers` behaviour that indicate strong and increasing interest in buying local food products. Such products are subject of extensive discussions in society but although regulat...

Download PDF file
  • EP ID EP340096
  • DOI -
  • Views 57
  • Downloads 0

How To Cite

(2015). Survey Paper on Pervasive Computing for Mobile Security. International Journal of Science and Research (IJSR), 4(1), -. https://europub.co.uk/articles/-A-340096