Dissecting the Security and Protection Issues in Pervasive Computing
Journal: Mehran University Research Journal of Engineering and Technology (Vol.37, No. 2)Publication Date: 2018-04-01
Authors : Javaid Q. Yasmeen H. Shah M.A. Kamran M. Sohail A.;
Page : 241-256
Keywords : Mobile Environment; Mobile Computing; Pervasive Computing; Ubicomp; Ubiquitous Computing; Pervasive Computing Environment.;
Abstract
Human beings reflect nomadic behaviour as they keep on travelling place to place whole day for personal or organizational purposes. The inception of modern networking technologies and the advent of wide range of applications in terms of services and resources have facilitated the users in many ways. The advancements in numerous areas such as embedded systems, WN (Wireless Networks), mobile and context-aware computing, anticipated pervasive computing dominated the human communication at large. Pervasive computing refers to the environment where information is accessible anywhere and anytime while existing system is invisible to the user. On the other hand, the invisibility of pervasive computing is also a problem in its adoption as users are unaware when and what devices collect their personal data and how it is being used. It has caused new security chaos as the more information about user is collected the more privacy and security concerns it raises, thus, the pervasive computing applications became key concern for user. This paper is aimed at analyzing the security and protection issues that arise while traveling from place to place connected with wireless mobile networks. The paper reviews many existing systems that offer possible security to pervasive users. An easy, precise and relative analysis and evaluation of surveyed pervasive systems are presented and some future directions are highlighted.
Other Latest Articles
- EFFECT OF ALCCOFINE ON FLYASH CONCRETE BLOCKS
- A Systematic Literature survey on Plagarism detection Tools
- An analysis of working capital and liquidity of ONGC Ltd with special reference to 2012 April to March 2017
- Choosing the optimal sequences of switching for a repairable system with passive redundancy by Petri networks coupled with the Monte-Carlo simulation
- MINIMALY INVASIVE SURGICAL TECHNIQUE USING CHORION MEMBRANE IN THE TREATMENT OF INTRABONY DEFECTS ? CASE REPORT
Last modified: 2018-03-25 03:00:26