SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
DOI:10.5121/iju.2015.6202 13
SECURED SMART SYSTEM DESING IN PERVASIVE
COMPUTING ENVIRONMENT USING VCS
M Varaprasad Rao1
and Prof N Ch Bharta Chryulu2
1
Dept of CSE, Anurag Group of Institutions, Hyderabad,India - 88
2
Dept of Statistics, Collegeof Science, Osmania University-7
ABSTRACT
Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors
embedded in mobile phones. The information generated by these devices is a big task in collection and
storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, we
made an attempt to propose a new security algorithm for providing security to Pervasive Computing
Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS)
algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it
automates various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a standard Home
gateway.
KEYWORDS
GSM, WI-Fi, Zigbee, Context-aware, Smart Sensor, and Pervasive Computing Environment, Public-Key
Encryption, Visual Cryptography Scheme and MMS.
1. INTRODUCTION
Many approaches to design the user interfaces such as Interaction Design, User Experience
Design (UX), Interactive Systems Design, Cognitive Ergonomics, Man-Machine Interface
(MMI), User Interface Design (UI), Human Factors, Cognitive Task Design, Information
Architecture (IA), Software Product Design, Usability Engineering, User-Centered Design (UCD)
and Computer Supported Collaborative Work (CSCW). The PCE are getting saturated with
computing and communication capability, and integrated with human users. The researchers
proposed number of security systems based on new technologies such as GSM (Global System
for Mobile Communication)[1], GPRS (General Packet Radio Service), Internet, Ubiquitous
sensor networks and Microcontroller unit and ZigBee sensor network[5]. The PCE created by the
smart Sensors [3], wireless networks and context-aware routing protocol for wireless sensor
networks. Each smart Sensor node should have multipath routing protocol to automatically
establish the wireless networks between Smart Nodes. This paper introduces the pervasive
computing based smart home monitoring systemโ€Ÿs using VCS design; that provides secure smart
services to users and demonstrates its implementation using a real time environment.
The general Biometric system [3-5] is described in figure 1. As its foresights are Authentication
has to be transparent, Trusted third party may not be available, Traditional key based systems will
not scale well, Trust based models work well with devices and agents, and Trust is not well
defined for human user. The advantages of biometrics are Uniqueness, No need to remember
passwords or carry tokens, Biometrics cannot be lost, stolen or forgotten, More secure than a long
International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
14
password, Solves repudiation problem, and Not susceptible to traditional attacks. The issues are
Biometrics is secure but not secret, permanently associated with user, used across multiple
applications, and can be covertly captured. Examples for Biometrics are 1. Physical Biometrics โ€“
Fingerprint, Hand Geometry Iris patterns. 2. Behavioral Biometrics โ€“ Handwriting, Signature,
Speech, Gait. 3. Chemical/Biological Biometrics โ€“ Perspiration, Skin composition
(spectroscopy). The Hashing technique is implemented using Biometric as shown in figure2.
Now a days mobile computing with tiny devices has been explored very much rapidly [10โ€“15].
The pollution monitoring application using Cell-Phone-based Sensor Network (CPSN) developed
International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
15
in [16] uses short-range communication outlets such as Wi-Fi or Bluetooth. In this paper, we
consider the same CPSN architecture as of [16] shown in following Figure 3.
Figure 3: Cell-phone-based sensor network.
VCS is a method for distributing a secret among a group of participants. Each Participant is given
a share of the secret. The secret can only be reconstructed when the shares are combined together.
Any individual participant cannot recover the secret on his/her own. In secret sharing scheme, let
there are โ€žnโ€Ÿ participants. Each participant gets a share in such a way that any group of โ€žtโ€Ÿ or more
participants can together reconstruct the secret but no group of less than โ€žtโ€Ÿ participants can
recover the secret. Such a system is called a (t, n) โ€“ threshold scheme, where โ€žtโ€Ÿ is the threshold.
In (t, n) visual cryptographic schemes, a secret image (text or picture) is encrypted into โ€žnโ€Ÿ shares,
which are distributed among โ€žnโ€Ÿ participants. The image cannot be decoded from any (tโ€“1) or
fewer shares but anyโ€žtโ€Ÿ or more participants can together decode it visually, without using any
complex decoding mechanism shown in following figure 4. Naor and Shamir [22] first proposed
the concept of visual cryptography in the open literature in 1994.
In this proposal, an image consisting of text, drawings etc. are encrypted and the resultant into
two images. These images are given to two different parties as shares. Decryption is possible only
when having both of them together. These shares are stored on transparencies and the process of
decryption begins with stacking these two transparencies together on the overhead projector. In
1995, Blakely introduced the concept of Visual Cryptography Schemes (VCS) by considering
each share is a plane and the secret is the point at which three shares intersect. Two shares out of
three are insufficient to determine the secret. This scheme is less efficient than Shamirโ€Ÿs scheme
because the shares are โ€žtโ€Ÿ times larger where โ€žtโ€Ÿ is threshold.
Figure 4: VCS image
International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
16
The Existing System
There are many definitions available in the literature.
1. Describes a system using Internet, GSM and Speech Recognition. In this system the
home gateway is connected via Internet and it needs a Personal Computer (PC). To work
with PC for longer time is very hard and it consumes power.
2. Describes a Java enabled mobile system. The research proposes an embedded home
server but it is required an Internet connectivity for GPRS. The mobile systems are
directly connected to processors via cables; this causes increasing the cost and also
required typical installation process. Once this system is installed successfully then it
becomes permanent network, and it is not easy to change the geographical location from
one to other place.
3. Describes a Bluetooth system, it consists of a primary controller and sub-controllers,
these sub-controller are enabled by Bluetooth. Every home applicance is directly
connected to a local sub-controller. The home devices communicate with their
corresponding sub-controller using wired communications. The communication is done
sub-controller to primary controller via wireless communications. It is mandatory that
evry home appliance is directly connected to a Bluetooth module.
4. The Biometric describes as; it is secure but not secret, permanently associated with user,
used across multiple applications, and can be covertly captured. The types of
circumventions may be Denial of service attacks, Fake biometrics attack, Replay and
Spoof attacks, Trojan horse attacks, Back end attacks and Collusion & Coercion.
Features of the Proposed System
The proposed system is a combination of Internet, GSM, BAN and Zigbee. The connection and
communication of sensors is done by Zigbee and to cover these sensors of a large space is done
through GSM. The proposed system provides reliable, secure, and anywhere access. To
transmitting the information to control panel the sensors uses wireless Zigbee. The control panel
controls the operation of this system and it acts like a gateway of home. This model uses the
wireless controlling methods such as, GSM Networks, Internet, Zigbee Sensor Network. It also
provides confidential and authentication credentials through VCS to maintain secure and secrecy
by a three step procedure explained in the proposed algorithm.
2. SYSTEM ARCHITECTURE
The following figure 5 explains about conceptual design of pervasive computing high secured
home system. The network has low speed data and high speed data rate; ZigBee is used for low
speed data and Wi-Fi is used for high speed data rate. A home gateway is used to provide
interoperability between the heterogeneous Zigbee and Wi-Fi networks. It also provides local and
remote control, and monitoring over the homeโ€Ÿs devices. Remote users can access the system
using the Internet. The remote userโ€Ÿs can do communicates the data in the form of cryptographic
secret sharing scheme via MMS over an Internet until they reach the home network. Then the
PCE uses wireless transmission using the homes Wi-Fi network to the Home Gateway.
International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
17
3. SYSTEM IMPLEMENTATION
As depicted above the PCE based smart home system is implemented for the perceiving and
control of household devices. To facilitate high data rate a Wi-Fi network is implemented in
connect with PCE devices. The interoperability is provided via home gateway. The gateway
provides an interface to user to access local and remote networks. The existing system PCE
provided security and safety of the smart home environment. To demonstrate the feasibility and
effectiveness of the proposed system for smart devices, a light switch, smart fan, smart sensors,
GSM networks and ZigBee remote control system have been developed and integrated with the
smart home automation system.
Security
The privacy is very less in the existing home automation system. So we proposed an algorithm
Smart Secure Hash Algorithm (SSHA) for Smart Home System using by pervasive computing
technologies.
Smart Secure Hash Algorithm
Security is considered as a major issue when it comes to a smart home system with the pervasive
computing environment. The proposed algorithm Smart Secure Hash Algorithm (SSHA) used in
smart home system and it works as follows:
1. Start the Digital Door Lock System.
2. Use the physical biometric measurement (Fingerprint or Iris pattern or Hand
Geometry) to read the data/image of a secured person through Smart Sensor.
3. The captured Biometric image will now check and match the image which is already
stored in the database engine.
4. If the image matches with the database image then
a. Obtain SMS based one time password/random number to mobile phone from
an authorized person. (Confidentiality)
International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
18
b. The database engine now will combine that captured biometric image and the
one time password and construct a (2, n) VCS data by using SHA,
Biometrics security algorithm and Visual Cryptography Secret Sharing
Scheme. (Authentication)
c. The constructed (2, n) VCS code is now sent to the database and compared
with the image of database. (Authentication)
d. If it matches then
The door will be opened
else
The error message will be displayed.
Else
The error message will be displayed.
5. If the Digital Door opens then all Smart Sensors and GSM module will be activated;
and will be allowed to control the home appliances of Pervasive Computing
Environment. Otherwise the defect sensor determines that who is not an authorized
person.
6. Once GSM system is activated a customized message will be sent to all the
connected users of the database. For example, โ€œMark Weiser is opened the door at
6.30 pmโ€
7. If the person entered inside home is not secured then a hidden camera is activated by
human defect sensors, it captures a MMS image and sent the same to the connected
database users. Immediately the secured user will have to lock the door remotely by
availing the SMS service.
4. CONCLUSION
In this paper, we made an attempt to propose a new security algorithm for providing
confidentiality and authentication credentials in Pervasive Computing Environment (PCE) system
using Public-key Encryption (PKE) algorithm, Biometric Security (BS) algorithm and Visual
Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it automates
various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a
standard Home gateway.
5. REFERENCES
1. Bares Yuksekkaya, M. Bilgehan Tosun, M. Kaan Ozcan and Ali Ziya Alkar. "A GSM, Internet
and Speech Controlled Wireless Interactive Home Automation System" IEEE Transactions on
Consumer Electronics, Vol.52 No. 3, pp: 837-843, 2006.
2. M. Van Der Werff, X. GUI and W.L. Xu. "A Mobile-Based Home Automation System" 2nd
International conference on mobile technology, Applications and systems. Pp 1-5,2005.
3. N. Sriskanthan, F. Tan and A. Karande, "Bluetooth based home automation system",
Microprocessors and Microsystems, Vol. 26, no. 6, pp. 281-289, 2002.
4. H. Ardam and I. Coskun, "A remote control for home and office appliances by telephone", IEEE
Transactions on Consumer Electronics, Vol. 44, no. 4, pp. 1291-1297, 1998.
5. Khusvinder Gill, Shuang-Hua Yang, Fang Yao, and Xin Lu,โ€A ZigBee Based Home Automation
Systemโ€, IEEE Transactions on Consumer Electronics, Vol. 55, No. 2, MAY 2009
6. Minal S.Khandare,Anjali Mahajan " Mobile Monitoring System For Smart Home",3rd
International conference on Emerging Trends in Engineering and Technology.IEEE 2010
International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
19
7. Ventylees Raj.S / International Journal of Engineering Science and Technology (IJEST) ISSN :
0975-5462 Vol. 4 No.11 November 2012 4668
8. Joseph. B. Kruskal,โ€On the Shortest Spanning Subtree of a Graph and the Traveling Salesman
Problem,โ€ In Proceeding of the American Mathematical Society, Vol. 7, no. 1, pp. 48โ€“50,
Feb.1956.
9. Naeem Jan, Chankil Lee, Saeed Iqbal, "Implementation of Zigbee-GSM based Home Security
Monitoring and Remote Control", 2011 IEEE.
10. T. Abdelzaher, Y. Anokwa, P. Boda et al., โ€œMobiscopes for human spaces,โ€ IEEE Pervasive
Computing, vol. 6, no. 2, pp. 20โ€“29, 2007. View at Publisher ยท View at Google Scholar ยท View at
Scopus
11. S. Eisenman, N. Lane, E. Miluzzo, R. Peterson, G. Ahn, and A. Campbell, โ€œMetrosense project:
people-centric sensing at scale,โ€ in Proceedings of the 1st Workshop on World-Sensor-Web
(WSW'06), Citeseer, Boulder, Colo, USA, 2006.
12. S. C. Hu, Y. C. Wang, C. Y. Huang, and Y. C. Tseng, โ€œA vehicular wireless sensor network for
CO2 monitoring,โ€ in Proceedings of the IEEE Sensors Conference (SENSORS'09), pp. 1498โ€“
1501, Christchurch, New Zealand, October 2009. View at Publisher ยท View at Google Scholar ยท
View at Scopus
13. B. Hull, V. Bychkovsky, Y. Zhang et al., โ€œCarTel: a distributed mobile sensor computing system,โ€
in Proceedings of the 4th International Conference on Embedded Networked Sensor Systems
(SenSys'06:), pp. 125โ€“138, November 2006. View at Publisher ยท View at Google Scholar ยท View
at Scopus
14. U. Lee, B. Zhou, M. Gerla, E. Magistretti, P. Bellavista, and A. Corradi, โ€œMobeyes: smart mobs
for urban monitoring with a vehicular sensor network,โ€ IEEE Wireless Communications, vol. 13,
no. 5, pp. 52โ€“57, 2006. View at Publisher ยท View at Google Scholar ยท View at Scopus
15. P. Mohan, V. Padmanabhan, and R. Ramjee, โ€œNericell: rich monitoring of road and traffic
conditions using mobile smartphones,โ€ in Proceedings of the 6th ACM Conference on Embedded
Network Sensor Systems, pp. 323โ€“336, 2008.
16. D. Chander, B. Jagyasi, U. B. Desai, and S. N. Merchant, โ€œSpatio-temporally adaptive waiting
time for cell phone sensor networks,โ€ International Journal of Distributed Sensor Networks, vol.
2011, Article ID 962476, 21 pages, 2011. View at Publisher ยท View at Google Scholar ยท View at
Scopus
17. M. B. Shah, S. N. Merchant, and U. B. Desai โ€œHuman-Mobility-Based Sensor Context-Aware
Routing Protocol for Delay-Tolerant Data Gathering in Multi-Sink Cell-Phone-Based Sensorโ€,
International Journal of Distributed Sensor Networks, Volume 2012 (2012), Article ID 785984, 19
pages, doi:10.1155/2012/785984
18. Adhikari A, Bose M, 2004, โ€œA new visual cryptographic scheme using Latin squaresโ€, IEICE
Trans Fund E, Vol.87, pp.1998-2002.
19. Adhikari A, Bose M, Kumar D, Roy B, 2005, โ€œApplications of PBIBDโ€Ÿs in developing visual
cryptographic schemesโ€, ISI Technical report No: ASD/2005/11.
20. Atenson G, Blundo C, de Santis, Stinson D, 1996, โ€œVisual cryptography for general access
structuresโ€, Information and Computation, Vol.129 (2), pp.86-106
21. Atenson G, Blundo C, de Santis, Stinson D, 1999, โ€œConstruction and bounds for Visual
cryptographyโ€, Theoretical Computer science, Vol.250, pp.143-161
22. Noar M, Shamir A, 1994, โ€œVisual cryptographyโ€, Eurocryptโ€Ÿ94, Springer-Verlog, Berlin, pp.1-12.
23. M Varaprasd Rao, A Damodaram, N Ch Bhrta Chryulu โ€œAlgorithm for clustering with Intrusion
Detection using Modified & Hashed K-means algorithmsโ€; CSIA12.
24. INKA research group. INKA research group "Information and Communication Systems".
[Online]. http://inka.htw-berlin.de/
25. http://oracle.com/Java APIs (2012).
26. MIT Project Oxygen. http://oxygen.lcs.mit.edu/videometaglue.html
27. CMU Project Aura. http://www-2.cs.cmu.edu/ aura/.
28. IBM Planet Blue, http://researchweb.watson.ibm.com/compsci/planetblue.html
29. http://www.google.co.in/search?q=pervasive+computing+devices&hl=en&tbo=u&tbm=isch&sour
ce=univ&sa=X&ei=LwUUbrJLYK0rAeV5oHIBw&sqi=2&ved=0CCwQsAQ&biw=1024&bih=6
29

More Related Content

What's hot

Zigbee based proposal
Zigbee based proposalZigbee based proposal
Zigbee based proposal
Abayneh Mekonnen
ย 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
ย 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
subhradeep mitra
ย 
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Conference Papers
ย 

What's hot (17)

A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
ย 
Zigbee based proposal
Zigbee based proposalZigbee based proposal
Zigbee based proposal
ย 
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...
ย 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ย 
A05510105
A05510105A05510105
A05510105
ย 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networks
ย 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
ย 
Power consumption analysis on an IoT network based on wemos: a case study
Power consumption analysis on an IoT network based on wemos: a case studyPower consumption analysis on an IoT network based on wemos: a case study
Power consumption analysis on an IoT network based on wemos: a case study
ย 
50120140507012
5012014050701250120140507012
50120140507012
ย 
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
ย 
7215nsa05
7215nsa057215nsa05
7215nsa05
ย 
Integration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIntegration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor network
ย 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
ย 
37 112-1-pb
37 112-1-pb37 112-1-pb
37 112-1-pb
ย 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
ย 
Research review of iot
Research review of iotResearch review of iot
Research review of iot
ย 
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
ย 

Similar to Secured smart system desing in pervasive computing environment using vcs

Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
Alexander Decker
ย 
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMA ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
ijistjournal
ย 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based security
ijistjournal
ย 
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
Mehraj U Din
ย 

Similar to Secured smart system desing in pervasive computing environment using vcs (20)

IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...IRJET-  	  A Survey on Secure Protocols of Communication for IoT Components i...
IRJET- A Survey on Secure Protocols of Communication for IoT Components i...
ย 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
ย 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
ย 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
ย 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
ย 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
ย 
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMA ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
ย 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based security
ย 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOT
ย 
Smart home for specially abled
Smart home for specially abledSmart home for specially abled
Smart home for specially abled
ย 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
ย 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
ย 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System Technologies
ย 
Irjet v7 i3284
Irjet v7 i3284Irjet v7 i3284
Irjet v7 i3284
ย 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
ย 
Secure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceSecure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
Secure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
ย 
IRJET- Smart Home Automation using IoT and Deep Learning
IRJET-  	  Smart Home Automation using IoT and Deep LearningIRJET-  	  Smart Home Automation using IoT and Deep Learning
IRJET- Smart Home Automation using IoT and Deep Learning
ย 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systems
ย 
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptxSMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
SMART SECURITY SYSTEM USING IOT - MID-TERM PROJECT.pptx
ย 
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
ย 

More from ijujournal

HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
ijujournal
ย 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ijujournal
ย 

More from ijujournal (20)

Users Approach on Providing Feedback for Smart Home Devices โ€“ Phase II
Users Approach on Providing Feedback for Smart Home Devices โ€“ Phase IIUsers Approach on Providing Feedback for Smart Home Devices โ€“ Phase II
Users Approach on Providing Feedback for Smart Home Devices โ€“ Phase II
ย 
Users Approach on Providing Feedback for Smart Home Devices โ€“ Phase II
Users Approach on Providing Feedback for Smart Home Devices โ€“ Phase IIUsers Approach on Providing Feedback for Smart Home Devices โ€“ Phase II
Users Approach on Providing Feedback for Smart Home Devices โ€“ Phase II
ย 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdf
ย 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ย 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
ย 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
ย 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ย 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
ย 
SERVICE DISCOVERY โ€“ A SURVEY AND COMPARISON
SERVICE DISCOVERY โ€“ A SURVEY AND COMPARISONSERVICE DISCOVERY โ€“ A SURVEY AND COMPARISON
SERVICE DISCOVERY โ€“ A SURVEY AND COMPARISON
ย 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
ย 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
ย 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
ย 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
ย 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
ย 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
ย 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
ย 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
ย 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
ย 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
ย 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ย 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 

Recently uploaded (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
ย 

Secured smart system desing in pervasive computing environment using vcs

  • 1. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015 DOI:10.5121/iju.2015.6202 13 SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS M Varaprasad Rao1 and Prof N Ch Bharta Chryulu2 1 Dept of CSE, Anurag Group of Institutions, Hyderabad,India - 88 2 Dept of Statistics, Collegeof Science, Osmania University-7 ABSTRACT Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors embedded in mobile phones. The information generated by these devices is a big task in collection and storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, we made an attempt to propose a new security algorithm for providing security to Pervasive Computing Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS) algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it automates various home appliances using VCS and also provides security against intrusion using Zigbee IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a standard Home gateway. KEYWORDS GSM, WI-Fi, Zigbee, Context-aware, Smart Sensor, and Pervasive Computing Environment, Public-Key Encryption, Visual Cryptography Scheme and MMS. 1. INTRODUCTION Many approaches to design the user interfaces such as Interaction Design, User Experience Design (UX), Interactive Systems Design, Cognitive Ergonomics, Man-Machine Interface (MMI), User Interface Design (UI), Human Factors, Cognitive Task Design, Information Architecture (IA), Software Product Design, Usability Engineering, User-Centered Design (UCD) and Computer Supported Collaborative Work (CSCW). The PCE are getting saturated with computing and communication capability, and integrated with human users. The researchers proposed number of security systems based on new technologies such as GSM (Global System for Mobile Communication)[1], GPRS (General Packet Radio Service), Internet, Ubiquitous sensor networks and Microcontroller unit and ZigBee sensor network[5]. The PCE created by the smart Sensors [3], wireless networks and context-aware routing protocol for wireless sensor networks. Each smart Sensor node should have multipath routing protocol to automatically establish the wireless networks between Smart Nodes. This paper introduces the pervasive computing based smart home monitoring systemโ€Ÿs using VCS design; that provides secure smart services to users and demonstrates its implementation using a real time environment. The general Biometric system [3-5] is described in figure 1. As its foresights are Authentication has to be transparent, Trusted third party may not be available, Traditional key based systems will not scale well, Trust based models work well with devices and agents, and Trust is not well defined for human user. The advantages of biometrics are Uniqueness, No need to remember passwords or carry tokens, Biometrics cannot be lost, stolen or forgotten, More secure than a long
  • 2. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015 14 password, Solves repudiation problem, and Not susceptible to traditional attacks. The issues are Biometrics is secure but not secret, permanently associated with user, used across multiple applications, and can be covertly captured. Examples for Biometrics are 1. Physical Biometrics โ€“ Fingerprint, Hand Geometry Iris patterns. 2. Behavioral Biometrics โ€“ Handwriting, Signature, Speech, Gait. 3. Chemical/Biological Biometrics โ€“ Perspiration, Skin composition (spectroscopy). The Hashing technique is implemented using Biometric as shown in figure2. Now a days mobile computing with tiny devices has been explored very much rapidly [10โ€“15]. The pollution monitoring application using Cell-Phone-based Sensor Network (CPSN) developed
  • 3. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015 15 in [16] uses short-range communication outlets such as Wi-Fi or Bluetooth. In this paper, we consider the same CPSN architecture as of [16] shown in following Figure 3. Figure 3: Cell-phone-based sensor network. VCS is a method for distributing a secret among a group of participants. Each Participant is given a share of the secret. The secret can only be reconstructed when the shares are combined together. Any individual participant cannot recover the secret on his/her own. In secret sharing scheme, let there are โ€žnโ€Ÿ participants. Each participant gets a share in such a way that any group of โ€žtโ€Ÿ or more participants can together reconstruct the secret but no group of less than โ€žtโ€Ÿ participants can recover the secret. Such a system is called a (t, n) โ€“ threshold scheme, where โ€žtโ€Ÿ is the threshold. In (t, n) visual cryptographic schemes, a secret image (text or picture) is encrypted into โ€žnโ€Ÿ shares, which are distributed among โ€žnโ€Ÿ participants. The image cannot be decoded from any (tโ€“1) or fewer shares but anyโ€žtโ€Ÿ or more participants can together decode it visually, without using any complex decoding mechanism shown in following figure 4. Naor and Shamir [22] first proposed the concept of visual cryptography in the open literature in 1994. In this proposal, an image consisting of text, drawings etc. are encrypted and the resultant into two images. These images are given to two different parties as shares. Decryption is possible only when having both of them together. These shares are stored on transparencies and the process of decryption begins with stacking these two transparencies together on the overhead projector. In 1995, Blakely introduced the concept of Visual Cryptography Schemes (VCS) by considering each share is a plane and the secret is the point at which three shares intersect. Two shares out of three are insufficient to determine the secret. This scheme is less efficient than Shamirโ€Ÿs scheme because the shares are โ€žtโ€Ÿ times larger where โ€žtโ€Ÿ is threshold. Figure 4: VCS image
  • 4. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015 16 The Existing System There are many definitions available in the literature. 1. Describes a system using Internet, GSM and Speech Recognition. In this system the home gateway is connected via Internet and it needs a Personal Computer (PC). To work with PC for longer time is very hard and it consumes power. 2. Describes a Java enabled mobile system. The research proposes an embedded home server but it is required an Internet connectivity for GPRS. The mobile systems are directly connected to processors via cables; this causes increasing the cost and also required typical installation process. Once this system is installed successfully then it becomes permanent network, and it is not easy to change the geographical location from one to other place. 3. Describes a Bluetooth system, it consists of a primary controller and sub-controllers, these sub-controller are enabled by Bluetooth. Every home applicance is directly connected to a local sub-controller. The home devices communicate with their corresponding sub-controller using wired communications. The communication is done sub-controller to primary controller via wireless communications. It is mandatory that evry home appliance is directly connected to a Bluetooth module. 4. The Biometric describes as; it is secure but not secret, permanently associated with user, used across multiple applications, and can be covertly captured. The types of circumventions may be Denial of service attacks, Fake biometrics attack, Replay and Spoof attacks, Trojan horse attacks, Back end attacks and Collusion & Coercion. Features of the Proposed System The proposed system is a combination of Internet, GSM, BAN and Zigbee. The connection and communication of sensors is done by Zigbee and to cover these sensors of a large space is done through GSM. The proposed system provides reliable, secure, and anywhere access. To transmitting the information to control panel the sensors uses wireless Zigbee. The control panel controls the operation of this system and it acts like a gateway of home. This model uses the wireless controlling methods such as, GSM Networks, Internet, Zigbee Sensor Network. It also provides confidential and authentication credentials through VCS to maintain secure and secrecy by a three step procedure explained in the proposed algorithm. 2. SYSTEM ARCHITECTURE The following figure 5 explains about conceptual design of pervasive computing high secured home system. The network has low speed data and high speed data rate; ZigBee is used for low speed data and Wi-Fi is used for high speed data rate. A home gateway is used to provide interoperability between the heterogeneous Zigbee and Wi-Fi networks. It also provides local and remote control, and monitoring over the homeโ€Ÿs devices. Remote users can access the system using the Internet. The remote userโ€Ÿs can do communicates the data in the form of cryptographic secret sharing scheme via MMS over an Internet until they reach the home network. Then the PCE uses wireless transmission using the homes Wi-Fi network to the Home Gateway.
  • 5. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015 17 3. SYSTEM IMPLEMENTATION As depicted above the PCE based smart home system is implemented for the perceiving and control of household devices. To facilitate high data rate a Wi-Fi network is implemented in connect with PCE devices. The interoperability is provided via home gateway. The gateway provides an interface to user to access local and remote networks. The existing system PCE provided security and safety of the smart home environment. To demonstrate the feasibility and effectiveness of the proposed system for smart devices, a light switch, smart fan, smart sensors, GSM networks and ZigBee remote control system have been developed and integrated with the smart home automation system. Security The privacy is very less in the existing home automation system. So we proposed an algorithm Smart Secure Hash Algorithm (SSHA) for Smart Home System using by pervasive computing technologies. Smart Secure Hash Algorithm Security is considered as a major issue when it comes to a smart home system with the pervasive computing environment. The proposed algorithm Smart Secure Hash Algorithm (SSHA) used in smart home system and it works as follows: 1. Start the Digital Door Lock System. 2. Use the physical biometric measurement (Fingerprint or Iris pattern or Hand Geometry) to read the data/image of a secured person through Smart Sensor. 3. The captured Biometric image will now check and match the image which is already stored in the database engine. 4. If the image matches with the database image then a. Obtain SMS based one time password/random number to mobile phone from an authorized person. (Confidentiality)
  • 6. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015 18 b. The database engine now will combine that captured biometric image and the one time password and construct a (2, n) VCS data by using SHA, Biometrics security algorithm and Visual Cryptography Secret Sharing Scheme. (Authentication) c. The constructed (2, n) VCS code is now sent to the database and compared with the image of database. (Authentication) d. If it matches then The door will be opened else The error message will be displayed. Else The error message will be displayed. 5. If the Digital Door opens then all Smart Sensors and GSM module will be activated; and will be allowed to control the home appliances of Pervasive Computing Environment. Otherwise the defect sensor determines that who is not an authorized person. 6. Once GSM system is activated a customized message will be sent to all the connected users of the database. For example, โ€œMark Weiser is opened the door at 6.30 pmโ€ 7. If the person entered inside home is not secured then a hidden camera is activated by human defect sensors, it captures a MMS image and sent the same to the connected database users. Immediately the secured user will have to lock the door remotely by availing the SMS service. 4. CONCLUSION In this paper, we made an attempt to propose a new security algorithm for providing confidentiality and authentication credentials in Pervasive Computing Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS) algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it automates various home appliances using VCS and also provides security against intrusion using Zigbee IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a standard Home gateway. 5. REFERENCES 1. Bares Yuksekkaya, M. Bilgehan Tosun, M. Kaan Ozcan and Ali Ziya Alkar. "A GSM, Internet and Speech Controlled Wireless Interactive Home Automation System" IEEE Transactions on Consumer Electronics, Vol.52 No. 3, pp: 837-843, 2006. 2. M. Van Der Werff, X. GUI and W.L. Xu. "A Mobile-Based Home Automation System" 2nd International conference on mobile technology, Applications and systems. Pp 1-5,2005. 3. N. Sriskanthan, F. Tan and A. Karande, "Bluetooth based home automation system", Microprocessors and Microsystems, Vol. 26, no. 6, pp. 281-289, 2002. 4. H. Ardam and I. Coskun, "A remote control for home and office appliances by telephone", IEEE Transactions on Consumer Electronics, Vol. 44, no. 4, pp. 1291-1297, 1998. 5. Khusvinder Gill, Shuang-Hua Yang, Fang Yao, and Xin Lu,โ€A ZigBee Based Home Automation Systemโ€, IEEE Transactions on Consumer Electronics, Vol. 55, No. 2, MAY 2009 6. Minal S.Khandare,Anjali Mahajan " Mobile Monitoring System For Smart Home",3rd International conference on Emerging Trends in Engineering and Technology.IEEE 2010
  • 7. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015 19 7. Ventylees Raj.S / International Journal of Engineering Science and Technology (IJEST) ISSN : 0975-5462 Vol. 4 No.11 November 2012 4668 8. Joseph. B. Kruskal,โ€On the Shortest Spanning Subtree of a Graph and the Traveling Salesman Problem,โ€ In Proceeding of the American Mathematical Society, Vol. 7, no. 1, pp. 48โ€“50, Feb.1956. 9. Naeem Jan, Chankil Lee, Saeed Iqbal, "Implementation of Zigbee-GSM based Home Security Monitoring and Remote Control", 2011 IEEE. 10. T. Abdelzaher, Y. Anokwa, P. Boda et al., โ€œMobiscopes for human spaces,โ€ IEEE Pervasive Computing, vol. 6, no. 2, pp. 20โ€“29, 2007. View at Publisher ยท View at Google Scholar ยท View at Scopus 11. S. Eisenman, N. Lane, E. Miluzzo, R. Peterson, G. Ahn, and A. Campbell, โ€œMetrosense project: people-centric sensing at scale,โ€ in Proceedings of the 1st Workshop on World-Sensor-Web (WSW'06), Citeseer, Boulder, Colo, USA, 2006. 12. S. C. Hu, Y. C. Wang, C. Y. Huang, and Y. C. Tseng, โ€œA vehicular wireless sensor network for CO2 monitoring,โ€ in Proceedings of the IEEE Sensors Conference (SENSORS'09), pp. 1498โ€“ 1501, Christchurch, New Zealand, October 2009. View at Publisher ยท View at Google Scholar ยท View at Scopus 13. B. Hull, V. Bychkovsky, Y. Zhang et al., โ€œCarTel: a distributed mobile sensor computing system,โ€ in Proceedings of the 4th International Conference on Embedded Networked Sensor Systems (SenSys'06:), pp. 125โ€“138, November 2006. View at Publisher ยท View at Google Scholar ยท View at Scopus 14. U. Lee, B. Zhou, M. Gerla, E. Magistretti, P. Bellavista, and A. Corradi, โ€œMobeyes: smart mobs for urban monitoring with a vehicular sensor network,โ€ IEEE Wireless Communications, vol. 13, no. 5, pp. 52โ€“57, 2006. View at Publisher ยท View at Google Scholar ยท View at Scopus 15. P. Mohan, V. Padmanabhan, and R. Ramjee, โ€œNericell: rich monitoring of road and traffic conditions using mobile smartphones,โ€ in Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, pp. 323โ€“336, 2008. 16. D. Chander, B. Jagyasi, U. B. Desai, and S. N. Merchant, โ€œSpatio-temporally adaptive waiting time for cell phone sensor networks,โ€ International Journal of Distributed Sensor Networks, vol. 2011, Article ID 962476, 21 pages, 2011. View at Publisher ยท View at Google Scholar ยท View at Scopus 17. M. B. Shah, S. N. Merchant, and U. B. Desai โ€œHuman-Mobility-Based Sensor Context-Aware Routing Protocol for Delay-Tolerant Data Gathering in Multi-Sink Cell-Phone-Based Sensorโ€, International Journal of Distributed Sensor Networks, Volume 2012 (2012), Article ID 785984, 19 pages, doi:10.1155/2012/785984 18. Adhikari A, Bose M, 2004, โ€œA new visual cryptographic scheme using Latin squaresโ€, IEICE Trans Fund E, Vol.87, pp.1998-2002. 19. Adhikari A, Bose M, Kumar D, Roy B, 2005, โ€œApplications of PBIBDโ€Ÿs in developing visual cryptographic schemesโ€, ISI Technical report No: ASD/2005/11. 20. Atenson G, Blundo C, de Santis, Stinson D, 1996, โ€œVisual cryptography for general access structuresโ€, Information and Computation, Vol.129 (2), pp.86-106 21. Atenson G, Blundo C, de Santis, Stinson D, 1999, โ€œConstruction and bounds for Visual cryptographyโ€, Theoretical Computer science, Vol.250, pp.143-161 22. Noar M, Shamir A, 1994, โ€œVisual cryptographyโ€, Eurocryptโ€Ÿ94, Springer-Verlog, Berlin, pp.1-12. 23. M Varaprasd Rao, A Damodaram, N Ch Bhrta Chryulu โ€œAlgorithm for clustering with Intrusion Detection using Modified & Hashed K-means algorithmsโ€; CSIA12. 24. INKA research group. INKA research group "Information and Communication Systems". [Online]. http://inka.htw-berlin.de/ 25. http://oracle.com/Java APIs (2012). 26. MIT Project Oxygen. http://oxygen.lcs.mit.edu/videometaglue.html 27. CMU Project Aura. http://www-2.cs.cmu.edu/ aura/. 28. IBM Planet Blue, http://researchweb.watson.ibm.com/compsci/planetblue.html 29. http://www.google.co.in/search?q=pervasive+computing+devices&hl=en&tbo=u&tbm=isch&sour ce=univ&sa=X&ei=LwUUbrJLYK0rAeV5oHIBw&sqi=2&ved=0CCwQsAQ&biw=1024&bih=6 29