SlideShare a Scribd company logo
1 of 8
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 86-93
www.iosrjournals.org
DOI: 10.9790/0661-17328693 www.iosrjournals.org 86 | Page
Pervasive Computing Applications And Its Security Issues &
Challenges
R.Uma, G.Archana, V.Komail.
Assistant Professors, Department Of Computer Applications, Dhanalakshmi Srinivasan College of Arts &
Science for Women Perambalur.
Assistant Professors, Dept of MCA, Dhanalakshmi Srinivasan college of arts and science for women
Perambalur,
Abstract: This paper discusses the emerging field of pervasive computing applications and its security
challenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace,
anywhere, at any time service to small or portable and wearable devices. This technology create new
opportunities and challenges for the Information Technology companies to place high-performance computers
and sensors in virtually every device, appliance, and piece of equipment in buildings, home care,Intelligent
transport system, workplaces, and factories, and even in clothing. Pervasive computing environment or PCE
share most of the security issues of traditional networked applications. These include authentication of devices
and users, privacy of data or information, defense against malicious code such as viruses, worms, Trojan horses
etc, and access control mechanisms. Finally it describes about the future focus for the pervasive computing
through the real time applications.
Keywords: Pervasive computing,Devices,Connectivity,Issues,Privacy,User Interfaces.
I. Introduction
The Pervasive computing encompasses three things all of the areas: 1. It concerns the way people view
mobile computing devices, and use them within their environments to perform tasks. 2. It concerns the way ap-
plications are created and deployed to enable such tasks to be performed.3.It concerns the environment and how
it is enhanced by the emergence and ubiquity of new information and functionality. The advantage of pervasive
computing environments is to make life more comfortable by providing device mobility and a digital infrastruc-
ture that has the ability to provide useful services to people in the environment, when and where they need them.
At the same time pervasive computing presents many risks and security related issues that were not previously
encountered in more traditional computing environments. In particular, issues such as privacy, trust and identity
become more challenging to the designers of such environments. Designing secure pervasive environments re-
quires the system to reliably confidently identify the user who wishes to access the environment’s resources. It
is also
Important to appreciate the risks involved in establishing and verifying the identity of users insuch en-
vironments. Privacy is also important as users need to be confident that their personal information is not used in
a way that they do not approve of. Privacy in such environments is particularly important as the syste needs to
be protective of the users’ data and perceived by the user to be that way.
II. Characteristics and Architecture of Pervasive Computing
Pervasive computing can be classified by a set ofattributes and capabilities that describe the extent of
itsfunctionality. Mobility and ad-hoc networking capabilities are expected to emerge relatively soon, that is
within the next one to two years. [1]Characteristics such as autonomy, context awareness and energy autarky are
not expected until later, taking anywhere from five to ten years. Context awareness and embededt in day-to-day
objects are viewed as pervasivecomputing’s ultimate and determining characteristics. Pervasive computing is
the result of computer technology advancing at exponential speeds -- a trend toward all man-made and some
natural products having hardware and software. [2]Pervasive computing goes beyond the realm of personal
computers: it is the idea that almost any device, from clothing to tools to appliances to cars to homes to the hu-
man body to your coffee mug, can be imbedded with chips to connect the device to aninfinite network of other
devices. The goal of pervasive computing, which combines current network technologies with wireless compu-
ting, voice recognition, Internet capability and artificial intelligence, is to create an environment where the con-
nectivity of devices is embedded in such a way that the connectivity is unobtrusive and always available.
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 87 | Page
III. Pervasive Computing Applications
Pervasive computing could be exploited to achieve great societal, organizational and individual bene-
fits. [3]The high-level goals of such applications mostly center on Quality of Life, Quality of Experience, Con-
venience, Return on Investment, Assistance, among others. The Mobile and Pervasive Computing laboratory is
a pioneer and one of the world leading research centers in applying pervasive computing in support of Aging,
Disabilities and Independence (ADI) addressing Quality of Life for the elderly and individuals with special
needs. ADI research is highly multi-disciplinary and requires diversified research talents that cannot be attained
without research collaborations (including international). The lab also addresses proactive health applications of
pervasive computing with emphasize on persuasive tele-health systems, which is another multi-disciplinary re-
search area.
Smart Greenhouse It is a natural air purifying system that utilises plants that havenaturally powerful air purify-
ing qualities in a mini greenhouse in the house, which provides fresh air and a pleasant natural scent.
The greenhouse automatically controls the climate to adjust the plants purifying abilities in order to provide
adequate freshness according to the contamination level of the house.
The Smart Floor
[4]The primary location tracking system used in the house is the Smart Floor, which is built into a resi-
dential-grade, raised tile system. Each tile is approximately one square foot with a pressure sensor fitted under-
neath. Unlike other tracking methods, the Smart Floor requires no attention from the residents, any device to
wear, or cameras that invade the residents’ privacy. To the user, the Smart Floor is very convenient as it is unen-
cumbered and requires no user attention. To the Smart House, the Smart Floor is very powerful as it provides for
rich sentience of location and activities, quietly and invisibly.
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 88 | Page
The Smart Floor is utilized as a collection of location and activity services (API) to other smart house
applications. Applications may need location contexts in which case they invoke the location service. Some ap-
plications are entirely based on locations such as daily activity counter, in which the total steps taken by the res-
ident are counted and reported to the cloud and other subscribers (e.g. care giver, or a relative). A phenomena
cloud implementation of the location service is also available which provides for a higher level of reliability of
the location service despite sensor failures and high levels of noise exhibited by the pressure sensors.
SMART PEN [4][[[:Smart pen offers a way of finding a definition for any unknown vocabulary when people
have problems reading books .
This is especially useful for documents written in a foreign language. All you need to do is underline or
write down the unknown word, press the translation key and then the pen automatically projects the translation
onto the document in.
The Smartwave: Meal Preparation Assistant
The SmartWave is a consists of a microwave oven and other devices and services that provide assis-
tance in meal preparation. An RFID reader mounted under a counter surface below the microwave allows ap-
propriately tagged frozen meals to be recognized by the SmartWave. The resident is provided via a monitor
above the microwave with the necessary instructions to ready the meal for cooking (remove film, stir ingre-
dients, etc.). The SmartWave can handle multiple cooking cycles (e.g. thaw, low-power followed by high power)
automatically. It sets power levels and cooking times automatically. Once the meal is ready, a notification is sent
to the resident, wherever he or she is in the house. This technology assists a variety of residents, such as those
with visual impairments who are unable to read the fine print on the frozen meals. It also assists residents with
hand dexterity problems or with mild dementia.
Cognitive Assistant
The main goal of the Cognitive Assistant (CA) project is to assist older adults with mild dementia over-
come difficulties in carrying out basic daily activities by means of reminders, orientation, and context-sensitive
triggering. Indoor, the cognitive assistant provides: (1) Attention Capture and (2) anywhere multimedia cueing
capabilities. The assistant itself is a general service decoupled from the specific contents and events of interests.
It can be utilized by any number of applications in the Smart House requiring any type of reminders, training, or
cueing. The CA has been used proactively as a reminder for critical tasks (to take medications, to eat at meal
times, to go see the doctor, to call son on his birthday, or to feed the pet). It has also been used as a training tool
to perform step-by-step tasks (specifically in re-training on hygiene tasks). Another purpose for training is beha-
vior alteration, which we demonstrated in preparing a meal using the SmartWave and ensuring hydration. CA
has also been used as a monitoring tool to record the activities performed by the elder.
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 89 | Page
Smart Plug
An intelligent environment should be able to sense and recognize the devices and services it has availa-
ble, interpret their status, and if needed interact with these devices to influence them. For example, in the Gator
Tech Smart House, self-sensing is a service that provides a real-time model that reflects the status of all the ap-
pliances in the space. The SmartPlug is a prerequisite service that enables self-sensing. The Smart Plug is a
standard power outlet invisibly fitted with a low-cost RFID reader housed inside the wall behind the plug hard-
ware. Each electrical device, such as a lamp or a fan, is given an RFID tag that contains information about the
device. Currently, the RFID tags are embedded in pass through plugs (the white cubical below). Once an ap-
pliance is plugged (through the pass through cube), its RFID tag is read and its location id identified. The house
gets to know this dynamic information instantaneously. By attaching a sensor node to the plug, actuation be-
comes possible. Actuations are limited to on/off switching of the appliance
Smart Bed
It can be difficult in this modern age for busy working people to feel good and peaceful when they
must get up early in the morning, but with smart bed, you can turn a stressful morning into an enjoyable one.
Smart Pillow
A pillow that could look after your bed time needs.
Smart pillow can read any books of your choice to you at bedtime and can play your favourite music to drift off
to when you start to get sleepy.
Cyber-Analytic Tele-Health
Researchers in the social and life sciences, as well as medical researchers and practitioners, have long
sought the ability to continuously and automaticallymonitor research subjects or patients for a variety of condi-
tions or disorders. Additionally, the use of monitoring data to influence treatment dosage or regimen within real-
time constraints is an important objective of behavior modification practice for psychological and medical ther-
apies. The Mobile and Pervasive Computing lab has formed a multi-disciplinary team to research tele-health
systems in the domain of obesity and diabetes. We have analyzed the traditional model for tele-health and de-
veloped key advances to the model that we believe will invigorate tele-health as an effective delivery mode for
health care. Our work so far addressed the need to extend tele-health systems with two powerful capabilities: (1)
behavior recognition, which is powerful sentience over and above vital signs and activity sensing, and (2) persu-
asion and adaptive persuasion loops, which is powerful (human) actuation. We believe that both additions (sen-
tience and actuation) will have significant impact on the effectiveness and efficacy of tele-health systems. We
are currently working on behavior recognition, Action Behavior Models for persuasion and participatory tele-
health. We are also planning for a major validation and quantification of our hypotheses.
Gate Reminder (DESK)
Forgetting an important item at home that you need for your day is something that happens to the best
of us.But now, this innovative Gate reminder will remind you what you need before you leave the house, so you
will never need to forget anything again.
Smart Dressing Table
The smart dressing table is the perfect accessory for women who are fed up with having to put their
makeupon in the morning in a bad and dark environment. This dressing table has several innovative functions
that work with the user to create a perfect and convenient atmosphere for putting up makeup on quickly and
effectively.
Digi Flower
It is a cordless communication system that indicates whether or not any member of the family is ap-
proaching the home.As well as improving communication and general relationships within the family, it also
provides general convenienc eand can also act as a safety device. It is composed of a portable transmiter and a
receiver.This device indicates by bursting into bloom when a family member approaches the house.This innova-
tion can act as a new communication interface for the people both inside and outside the house.
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 90 | Page
Electronic Paper And Smart Wall
The days of paper books and newspapers what they are going to be replaced with, according to some-
entrepreneurs, is “epaper”.It is basically a computer monitor that is so thin that you could roll it up and stick it
in your pocket. One of the problems when changing a display is the size.How can we utilise the size of a display
effectively when it is constantly getting bigger.
Smart Mat
A mat at the entrance of home, provides a vital connection between inside and outside the house.By
sensing the body weight and footprint of the user, the smart mat immediately recognises which user isstepping
on the mat.
Pervasive Computing in Healthcare
Pervasive computing is often mentioned in the context of improving healthcare.Usually, these exam-
ples involve consumer monitoring devices such as bloodpressure cuffs and glucose meters that can upload data
to a personal computer for collection and dissemination to professional caregivers.By collecting patient data in
settings more varied than doctors’offices, healthcare provider shope to better understand themany facets of pa-
tients’ daily gives and then modify the rapies to the individual.Another important context is emergency care to
accelerate access to medical records at the emergency site or to bring experts to the scene virtually. By giving
medical professionals appropriate,complete information,we expect to deliver better care that’s tuned not only to
the situation but also to the patient’s history.The surgical field also receives much attention,as surgeons and
nurses must monitor and controlvarious vital functions under intensely stressful conditions. Technologists are
developing systemsto collect and process an ever-increasing range of telemetry from instruments used in an
operating room and to augment human ability to detect patterns of concern that could require immediate action.
A promising future
Many of these applications have appeared in the popular press and are actually starting to be dep-
loyed.At one end of the spectrum, consumer devices easily network with home PCs to let users gather data from
sensors in the home that their physicians can access online. At the other end, telesurgery is becoming a practical
reality, with remote physicians able to consult on a patient’s conditionas well as take part in a surgical proce-
dure.This special issue seeks to go beyond these“expected” applications and bring the reader an even wider
range of applicability for pervasivecomputing technologies in the highly variedhealthcare domain.Proponents
tout pervasive computing as benefiting healthcare in at least three ways:
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 91 | Page
1. Lowering costs by getting appropriate care tothe people who need it much faster than previously possible;
2. Making expert care accessible to more people, there by increasing the scale at which first-rate healthcare is
applied;
3. Making healthcare more personalized, prompting individuals to take more responsibility for maintaining their
health.
IV. Security Challenges In Pervasive Computing Environment
Pervasive computing environment or PCE share most of the security issues of traditional networked
applications. These include authentication of devices and users, privacy of data or information, defense against
malicious code such as viruses, worms, Trojan horses etc, and access control mechanisms. However, the perva-
sive computing environment adds some unique issues to the already complex security arena. Physical security is
important as the devices can be easily misplaced or stolen. Information that is usually confined behind a corpo-
rate firewall is now winging its way through the air, possibly spending some time on hosted servers or wireless
gateways.
V. Security issues
Many attempts have been made to apply traditional security concepts and solutions to pervasive plat-
forms. However, in most cases, a lot of modifications are needed inorder for the security infrastructure to fit
within the pervasive framework leading to a high level of risk of introducing new breaches. A generic security
framework is needed [5]. One way to minimise the security issues with pervasive computing frameworks is to
identify them in the early stages of their development. These issues include:
5.1 Reliability
Pervasive systems expose a larger attack surface with many points of failure in comparison to tradi-
tional computing environments [2]. If people depend upon pervasive systems to mediate day-to-day activities,
such systems will quickly become missioncritical.They need to be robust, dependable, and always available.
This is a very difficult problem for a pervasive computing framework to address. Due to the wide variety of
computing technologies that entities will use, the risk of introducing security issues that may threaten the relia-
bility of services will increase.
5.2 Trust
The infrastructure that supports a pervasive computing system introduces new security challenges not
addressed in existing security models, including in the domain of trust management [6, 7]. The issue of trust will
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 92 | Page
arise when anentity, such as a PDA, mobile phone or laptop computer that is unknown to otherentities offers
services. Entities offering services may have an established connection history and are trusted. An entity con-
necting to a pervasive environment for the first time will have no historical records on which to base a measure
of trust. Such an entity may act maliciously and try to disrupt services being offered or it may be genuinely try-
ing to avail of a specific service. The question of trust arises and whether existing members of the environment
trust the intentions of this new entity. For example, two new entities (A and B) that are connected to the perva-
sive environment may wish exchange data. Do they trust each other? to traditional computing environments [2].
If people depend upon pervasive systems to mediate day-to-day activities, such systems will quickly become
mission critical.They need to be robust, dependable, and always available. This is a very difficult problem for a
pervasive computing framework to address. Due to the wide variety of computing technologies that entities will
use, the risk of introducing security issues that may threaten the reliability of services will increase.
5.3 Malicious attacks
A common form of malicious attack is a Denial of Service (DoS) attack. A DoS is anattack with the
purpose of preventing legitimate users from using a specfied network resource such as a website, web service, or
computer system [9]. A Distributed Denialof Service (DDoS) attack is a coordinated attack on the availability of
services ofa given target system or network that is launched indirectly through many compromised computing
systems [10]. The threat of a deliberate attack by an entity connectedto a pervasive computing framework will
exist. Any entity can act maliciouslyand may deliberately try to access a service provided by another entity that
it is not permitted. A DoS attack can not only cause the innocent entity to malfunction but may also introduce
other problems such as severe network latency, scalability problems when other entities try to connect to the
framework and service unavailability.
5.4 Information propagation
When data is transmitted between entities, it is possible that it may be altered or corrupted accidentally
or maliciously. It is important that the integrity of the data in apervasive environment is maintained. If the data
is altered, the entities may not have any mechanism to detect this.
5.5 Recourse
Ranganathan states that because pervasive systems will mediate everyday physicalactivity, technical
mechanisms to facilitate recourse must be built-in from the start[2]. When one entity provides a service to
another, the problem exists when one of the entities reneges before a successful termination. A pervasive com-
puting frameworkshould have mechanisms to deal with this.In the next section we introduce an example of a
pervasive computing framework called ConStruct. We use this to motivate discussion ofhow security issues
impact services that are supported in a pervasive environment.
5.6 Data Communication
Privacy of the data encompasses two aspects. First, it hasto ensure that data being shared or communi-
cated is not being hacked by any active or passive attackers. As aninitial thought, we consider several encryption
and decryption techniques. But at the same time we need to think about the other side of the coin which reminds
us about the memory, battery power and other limitations.Along with that, the users in pervasive computing
environment have much more elasticity and sovereignty in mobility. This includes a large variety of domains
ranging from well protected environments to totally open unprotected situations which makes the data protect its
issue worse. Secondly, how can it be guaranteed that theuser data which is being collected almost obviously
willnot be used maliciously? Or how we can ensure with certainty that the complicated data is not being proces-
sedby any unauthorized user
5.7 Trust
In order to overcome several constraints, mutualcooperation, interconnectedness and inter dependabilityhave
been exposed as the obvious uniqueness of pervasivecomputing environment. Along with these occurs theissue
of trust. If data is shared with an unwarranted device, the probability of data security reduces automatically. [8].
VI. Conclusions
In this Paper we have gathered the information about the pervasive computing technologies, architec-
ture, applications, issues and challenges we have seen, today the pervasive/ubiquitous computing is a fertile
source of challenging problems in computer systems. In future we focus our research for creating applications
such as smart home or office or university etc.without any technical challenges by using the advanced embedded
systems or by efficient soft computing techniques.devices need to be perceived as portals into the applica-
tion/data space supported by the environment, rather than repositories of custom software. Applications need to
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 93 | Page
be seen as tasks performed on behalf of a user, not as programs written to exploit the resources of a specific
computer. The goal of a pervasive computing framework is to support services offered by entities in a heteroge-
neous environment. It is highly probable that most entities havelittle or no knowledge of other entities and the
services they offer. This introduces important security issues especially when a new entity makes available a
new servicefor the first time.As a result of this 'unknown' factor introduced in this environment, there is astrong
expectation for a pervasive computing framework to provide adequate security to all entities. The framework is
transparent to these entities and as such they appear to communicate peer-to-peer. Unless entities are aware of
appropriate security mechanisms, there may be reluctance for these to connect to the framework and avail of
services in offer.
References
[1]. http://en.wikipedia.org/wiki/Pervasive_Computing
[2]. Lathies Bhasker T “Pervasive Computing Issues, Challenges andApplications”International Journal Of Engineering And Computer
Science ISSN: 2319-7242 Volume 2 Issue 12, Dec.2013.
[3]. “Security Issues with Pervasive Computing Frameworks” Michael CollinsSystems Research Group, School of Computer
Science and Informatics,UCD Dublin, Ireand.
[4]. ”Issues and challenges in ubiqutious computing” Protocol Engineering & Technology (PET) Lab. Indian Institute of
Science,Bangalore.
[5]. https://www.google.co.in/search?q=pervasive+compuing+characteristics&biw.
[6]. A Survey on Pervasive Computing Er. Manita Gorai, Er. Kamna Agarwal , International Journal of Scientific & Engineering Re-
search Volume 3, Issue 6, June-2012
[7]. M. Satyanarayanan: Pervasive Computing: Vision and Challenges. IEEE Personel Communications, 2001

More Related Content

What's hot

Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middlewareLeonardo Bruni
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computingLikan Patra
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pravallika Reddy
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Arpan Patel
 
pervasive computing
pervasive computingpervasive computing
pervasive computingSweety Singh
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing BhaktiKarale
 
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...Argus Labs
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingHoneyson Joseph
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItRob Manson
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networkingAashish Jain
 
5 context aware services
5 context aware services5 context aware services
5 context aware servicesguest3cf4991
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesHongseok Kim
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware ComputingMOHIT DADU
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingKelly Zhang
 

What's hot (20)

Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middleware
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
5 context aware services
5 context aware services5 context aware services
5 context aware services
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 

Similar to Pervasive Computing Applications And Its Security Issues & Challenges

Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyHatum Hussain
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyHatum Hussain
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduinoneirew J
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegenceLovely Singla
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPallav Kumar
 
IRJET- Smart Sensory Furniture
IRJET-  	  Smart Sensory FurnitureIRJET-  	  Smart Sensory Furniture
IRJET- Smart Sensory FurnitureIRJET Journal
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxMd.Jamilur Rahman
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptRishabhRathore71
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
PPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in NursingPPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in NursingArchanaSelvan
 
Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...IJERD Editor
 

Similar to Pervasive Computing Applications And Its Security Issues & Challenges (20)

Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduino
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
IRJET- Smart Sensory Furniture
IRJET-  	  Smart Sensory FurnitureIRJET-  	  Smart Sensory Furniture
IRJET- Smart Sensory Furniture
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Pervasive computing.pptx
Pervasive computing.pptxPervasive computing.pptx
Pervasive computing.pptx
 
50120140502006
5012014050200650120140502006
50120140502006
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
PPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in NursingPPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in Nursing
 
Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 

Pervasive Computing Applications And Its Security Issues & Challenges

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 86-93 www.iosrjournals.org DOI: 10.9790/0661-17328693 www.iosrjournals.org 86 | Page Pervasive Computing Applications And Its Security Issues & Challenges R.Uma, G.Archana, V.Komail. Assistant Professors, Department Of Computer Applications, Dhanalakshmi Srinivasan College of Arts & Science for Women Perambalur. Assistant Professors, Dept of MCA, Dhanalakshmi Srinivasan college of arts and science for women Perambalur, Abstract: This paper discusses the emerging field of pervasive computing applications and its security challenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace, anywhere, at any time service to small or portable and wearable devices. This technology create new opportunities and challenges for the Information Technology companies to place high-performance computers and sensors in virtually every device, appliance, and piece of equipment in buildings, home care,Intelligent transport system, workplaces, and factories, and even in clothing. Pervasive computing environment or PCE share most of the security issues of traditional networked applications. These include authentication of devices and users, privacy of data or information, defense against malicious code such as viruses, worms, Trojan horses etc, and access control mechanisms. Finally it describes about the future focus for the pervasive computing through the real time applications. Keywords: Pervasive computing,Devices,Connectivity,Issues,Privacy,User Interfaces. I. Introduction The Pervasive computing encompasses three things all of the areas: 1. It concerns the way people view mobile computing devices, and use them within their environments to perform tasks. 2. It concerns the way ap- plications are created and deployed to enable such tasks to be performed.3.It concerns the environment and how it is enhanced by the emergence and ubiquity of new information and functionality. The advantage of pervasive computing environments is to make life more comfortable by providing device mobility and a digital infrastruc- ture that has the ability to provide useful services to people in the environment, when and where they need them. At the same time pervasive computing presents many risks and security related issues that were not previously encountered in more traditional computing environments. In particular, issues such as privacy, trust and identity become more challenging to the designers of such environments. Designing secure pervasive environments re- quires the system to reliably confidently identify the user who wishes to access the environment’s resources. It is also Important to appreciate the risks involved in establishing and verifying the identity of users insuch en- vironments. Privacy is also important as users need to be confident that their personal information is not used in a way that they do not approve of. Privacy in such environments is particularly important as the syste needs to be protective of the users’ data and perceived by the user to be that way. II. Characteristics and Architecture of Pervasive Computing Pervasive computing can be classified by a set ofattributes and capabilities that describe the extent of itsfunctionality. Mobility and ad-hoc networking capabilities are expected to emerge relatively soon, that is within the next one to two years. [1]Characteristics such as autonomy, context awareness and energy autarky are not expected until later, taking anywhere from five to ten years. Context awareness and embededt in day-to-day objects are viewed as pervasivecomputing’s ultimate and determining characteristics. Pervasive computing is the result of computer technology advancing at exponential speeds -- a trend toward all man-made and some natural products having hardware and software. [2]Pervasive computing goes beyond the realm of personal computers: it is the idea that almost any device, from clothing to tools to appliances to cars to homes to the hu- man body to your coffee mug, can be imbedded with chips to connect the device to aninfinite network of other devices. The goal of pervasive computing, which combines current network technologies with wireless compu- ting, voice recognition, Internet capability and artificial intelligence, is to create an environment where the con- nectivity of devices is embedded in such a way that the connectivity is unobtrusive and always available.
  • 2. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 87 | Page III. Pervasive Computing Applications Pervasive computing could be exploited to achieve great societal, organizational and individual bene- fits. [3]The high-level goals of such applications mostly center on Quality of Life, Quality of Experience, Con- venience, Return on Investment, Assistance, among others. The Mobile and Pervasive Computing laboratory is a pioneer and one of the world leading research centers in applying pervasive computing in support of Aging, Disabilities and Independence (ADI) addressing Quality of Life for the elderly and individuals with special needs. ADI research is highly multi-disciplinary and requires diversified research talents that cannot be attained without research collaborations (including international). The lab also addresses proactive health applications of pervasive computing with emphasize on persuasive tele-health systems, which is another multi-disciplinary re- search area. Smart Greenhouse It is a natural air purifying system that utilises plants that havenaturally powerful air purify- ing qualities in a mini greenhouse in the house, which provides fresh air and a pleasant natural scent. The greenhouse automatically controls the climate to adjust the plants purifying abilities in order to provide adequate freshness according to the contamination level of the house. The Smart Floor [4]The primary location tracking system used in the house is the Smart Floor, which is built into a resi- dential-grade, raised tile system. Each tile is approximately one square foot with a pressure sensor fitted under- neath. Unlike other tracking methods, the Smart Floor requires no attention from the residents, any device to wear, or cameras that invade the residents’ privacy. To the user, the Smart Floor is very convenient as it is unen- cumbered and requires no user attention. To the Smart House, the Smart Floor is very powerful as it provides for rich sentience of location and activities, quietly and invisibly.
  • 3. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 88 | Page The Smart Floor is utilized as a collection of location and activity services (API) to other smart house applications. Applications may need location contexts in which case they invoke the location service. Some ap- plications are entirely based on locations such as daily activity counter, in which the total steps taken by the res- ident are counted and reported to the cloud and other subscribers (e.g. care giver, or a relative). A phenomena cloud implementation of the location service is also available which provides for a higher level of reliability of the location service despite sensor failures and high levels of noise exhibited by the pressure sensors. SMART PEN [4][[[:Smart pen offers a way of finding a definition for any unknown vocabulary when people have problems reading books . This is especially useful for documents written in a foreign language. All you need to do is underline or write down the unknown word, press the translation key and then the pen automatically projects the translation onto the document in. The Smartwave: Meal Preparation Assistant The SmartWave is a consists of a microwave oven and other devices and services that provide assis- tance in meal preparation. An RFID reader mounted under a counter surface below the microwave allows ap- propriately tagged frozen meals to be recognized by the SmartWave. The resident is provided via a monitor above the microwave with the necessary instructions to ready the meal for cooking (remove film, stir ingre- dients, etc.). The SmartWave can handle multiple cooking cycles (e.g. thaw, low-power followed by high power) automatically. It sets power levels and cooking times automatically. Once the meal is ready, a notification is sent to the resident, wherever he or she is in the house. This technology assists a variety of residents, such as those with visual impairments who are unable to read the fine print on the frozen meals. It also assists residents with hand dexterity problems or with mild dementia. Cognitive Assistant The main goal of the Cognitive Assistant (CA) project is to assist older adults with mild dementia over- come difficulties in carrying out basic daily activities by means of reminders, orientation, and context-sensitive triggering. Indoor, the cognitive assistant provides: (1) Attention Capture and (2) anywhere multimedia cueing capabilities. The assistant itself is a general service decoupled from the specific contents and events of interests. It can be utilized by any number of applications in the Smart House requiring any type of reminders, training, or cueing. The CA has been used proactively as a reminder for critical tasks (to take medications, to eat at meal times, to go see the doctor, to call son on his birthday, or to feed the pet). It has also been used as a training tool to perform step-by-step tasks (specifically in re-training on hygiene tasks). Another purpose for training is beha- vior alteration, which we demonstrated in preparing a meal using the SmartWave and ensuring hydration. CA has also been used as a monitoring tool to record the activities performed by the elder.
  • 4. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 89 | Page Smart Plug An intelligent environment should be able to sense and recognize the devices and services it has availa- ble, interpret their status, and if needed interact with these devices to influence them. For example, in the Gator Tech Smart House, self-sensing is a service that provides a real-time model that reflects the status of all the ap- pliances in the space. The SmartPlug is a prerequisite service that enables self-sensing. The Smart Plug is a standard power outlet invisibly fitted with a low-cost RFID reader housed inside the wall behind the plug hard- ware. Each electrical device, such as a lamp or a fan, is given an RFID tag that contains information about the device. Currently, the RFID tags are embedded in pass through plugs (the white cubical below). Once an ap- pliance is plugged (through the pass through cube), its RFID tag is read and its location id identified. The house gets to know this dynamic information instantaneously. By attaching a sensor node to the plug, actuation be- comes possible. Actuations are limited to on/off switching of the appliance Smart Bed It can be difficult in this modern age for busy working people to feel good and peaceful when they must get up early in the morning, but with smart bed, you can turn a stressful morning into an enjoyable one. Smart Pillow A pillow that could look after your bed time needs. Smart pillow can read any books of your choice to you at bedtime and can play your favourite music to drift off to when you start to get sleepy. Cyber-Analytic Tele-Health Researchers in the social and life sciences, as well as medical researchers and practitioners, have long sought the ability to continuously and automaticallymonitor research subjects or patients for a variety of condi- tions or disorders. Additionally, the use of monitoring data to influence treatment dosage or regimen within real- time constraints is an important objective of behavior modification practice for psychological and medical ther- apies. The Mobile and Pervasive Computing lab has formed a multi-disciplinary team to research tele-health systems in the domain of obesity and diabetes. We have analyzed the traditional model for tele-health and de- veloped key advances to the model that we believe will invigorate tele-health as an effective delivery mode for health care. Our work so far addressed the need to extend tele-health systems with two powerful capabilities: (1) behavior recognition, which is powerful sentience over and above vital signs and activity sensing, and (2) persu- asion and adaptive persuasion loops, which is powerful (human) actuation. We believe that both additions (sen- tience and actuation) will have significant impact on the effectiveness and efficacy of tele-health systems. We are currently working on behavior recognition, Action Behavior Models for persuasion and participatory tele- health. We are also planning for a major validation and quantification of our hypotheses. Gate Reminder (DESK) Forgetting an important item at home that you need for your day is something that happens to the best of us.But now, this innovative Gate reminder will remind you what you need before you leave the house, so you will never need to forget anything again. Smart Dressing Table The smart dressing table is the perfect accessory for women who are fed up with having to put their makeupon in the morning in a bad and dark environment. This dressing table has several innovative functions that work with the user to create a perfect and convenient atmosphere for putting up makeup on quickly and effectively. Digi Flower It is a cordless communication system that indicates whether or not any member of the family is ap- proaching the home.As well as improving communication and general relationships within the family, it also provides general convenienc eand can also act as a safety device. It is composed of a portable transmiter and a receiver.This device indicates by bursting into bloom when a family member approaches the house.This innova- tion can act as a new communication interface for the people both inside and outside the house.
  • 5. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 90 | Page Electronic Paper And Smart Wall The days of paper books and newspapers what they are going to be replaced with, according to some- entrepreneurs, is “epaper”.It is basically a computer monitor that is so thin that you could roll it up and stick it in your pocket. One of the problems when changing a display is the size.How can we utilise the size of a display effectively when it is constantly getting bigger. Smart Mat A mat at the entrance of home, provides a vital connection between inside and outside the house.By sensing the body weight and footprint of the user, the smart mat immediately recognises which user isstepping on the mat. Pervasive Computing in Healthcare Pervasive computing is often mentioned in the context of improving healthcare.Usually, these exam- ples involve consumer monitoring devices such as bloodpressure cuffs and glucose meters that can upload data to a personal computer for collection and dissemination to professional caregivers.By collecting patient data in settings more varied than doctors’offices, healthcare provider shope to better understand themany facets of pa- tients’ daily gives and then modify the rapies to the individual.Another important context is emergency care to accelerate access to medical records at the emergency site or to bring experts to the scene virtually. By giving medical professionals appropriate,complete information,we expect to deliver better care that’s tuned not only to the situation but also to the patient’s history.The surgical field also receives much attention,as surgeons and nurses must monitor and controlvarious vital functions under intensely stressful conditions. Technologists are developing systemsto collect and process an ever-increasing range of telemetry from instruments used in an operating room and to augment human ability to detect patterns of concern that could require immediate action. A promising future Many of these applications have appeared in the popular press and are actually starting to be dep- loyed.At one end of the spectrum, consumer devices easily network with home PCs to let users gather data from sensors in the home that their physicians can access online. At the other end, telesurgery is becoming a practical reality, with remote physicians able to consult on a patient’s conditionas well as take part in a surgical proce- dure.This special issue seeks to go beyond these“expected” applications and bring the reader an even wider range of applicability for pervasivecomputing technologies in the highly variedhealthcare domain.Proponents tout pervasive computing as benefiting healthcare in at least three ways:
  • 6. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 91 | Page 1. Lowering costs by getting appropriate care tothe people who need it much faster than previously possible; 2. Making expert care accessible to more people, there by increasing the scale at which first-rate healthcare is applied; 3. Making healthcare more personalized, prompting individuals to take more responsibility for maintaining their health. IV. Security Challenges In Pervasive Computing Environment Pervasive computing environment or PCE share most of the security issues of traditional networked applications. These include authentication of devices and users, privacy of data or information, defense against malicious code such as viruses, worms, Trojan horses etc, and access control mechanisms. However, the perva- sive computing environment adds some unique issues to the already complex security arena. Physical security is important as the devices can be easily misplaced or stolen. Information that is usually confined behind a corpo- rate firewall is now winging its way through the air, possibly spending some time on hosted servers or wireless gateways. V. Security issues Many attempts have been made to apply traditional security concepts and solutions to pervasive plat- forms. However, in most cases, a lot of modifications are needed inorder for the security infrastructure to fit within the pervasive framework leading to a high level of risk of introducing new breaches. A generic security framework is needed [5]. One way to minimise the security issues with pervasive computing frameworks is to identify them in the early stages of their development. These issues include: 5.1 Reliability Pervasive systems expose a larger attack surface with many points of failure in comparison to tradi- tional computing environments [2]. If people depend upon pervasive systems to mediate day-to-day activities, such systems will quickly become missioncritical.They need to be robust, dependable, and always available. This is a very difficult problem for a pervasive computing framework to address. Due to the wide variety of computing technologies that entities will use, the risk of introducing security issues that may threaten the relia- bility of services will increase. 5.2 Trust The infrastructure that supports a pervasive computing system introduces new security challenges not addressed in existing security models, including in the domain of trust management [6, 7]. The issue of trust will
  • 7. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 92 | Page arise when anentity, such as a PDA, mobile phone or laptop computer that is unknown to otherentities offers services. Entities offering services may have an established connection history and are trusted. An entity con- necting to a pervasive environment for the first time will have no historical records on which to base a measure of trust. Such an entity may act maliciously and try to disrupt services being offered or it may be genuinely try- ing to avail of a specific service. The question of trust arises and whether existing members of the environment trust the intentions of this new entity. For example, two new entities (A and B) that are connected to the perva- sive environment may wish exchange data. Do they trust each other? to traditional computing environments [2]. If people depend upon pervasive systems to mediate day-to-day activities, such systems will quickly become mission critical.They need to be robust, dependable, and always available. This is a very difficult problem for a pervasive computing framework to address. Due to the wide variety of computing technologies that entities will use, the risk of introducing security issues that may threaten the reliability of services will increase. 5.3 Malicious attacks A common form of malicious attack is a Denial of Service (DoS) attack. A DoS is anattack with the purpose of preventing legitimate users from using a specfied network resource such as a website, web service, or computer system [9]. A Distributed Denialof Service (DDoS) attack is a coordinated attack on the availability of services ofa given target system or network that is launched indirectly through many compromised computing systems [10]. The threat of a deliberate attack by an entity connectedto a pervasive computing framework will exist. Any entity can act maliciouslyand may deliberately try to access a service provided by another entity that it is not permitted. A DoS attack can not only cause the innocent entity to malfunction but may also introduce other problems such as severe network latency, scalability problems when other entities try to connect to the framework and service unavailability. 5.4 Information propagation When data is transmitted between entities, it is possible that it may be altered or corrupted accidentally or maliciously. It is important that the integrity of the data in apervasive environment is maintained. If the data is altered, the entities may not have any mechanism to detect this. 5.5 Recourse Ranganathan states that because pervasive systems will mediate everyday physicalactivity, technical mechanisms to facilitate recourse must be built-in from the start[2]. When one entity provides a service to another, the problem exists when one of the entities reneges before a successful termination. A pervasive com- puting frameworkshould have mechanisms to deal with this.In the next section we introduce an example of a pervasive computing framework called ConStruct. We use this to motivate discussion ofhow security issues impact services that are supported in a pervasive environment. 5.6 Data Communication Privacy of the data encompasses two aspects. First, it hasto ensure that data being shared or communi- cated is not being hacked by any active or passive attackers. As aninitial thought, we consider several encryption and decryption techniques. But at the same time we need to think about the other side of the coin which reminds us about the memory, battery power and other limitations.Along with that, the users in pervasive computing environment have much more elasticity and sovereignty in mobility. This includes a large variety of domains ranging from well protected environments to totally open unprotected situations which makes the data protect its issue worse. Secondly, how can it be guaranteed that theuser data which is being collected almost obviously willnot be used maliciously? Or how we can ensure with certainty that the complicated data is not being proces- sedby any unauthorized user 5.7 Trust In order to overcome several constraints, mutualcooperation, interconnectedness and inter dependabilityhave been exposed as the obvious uniqueness of pervasivecomputing environment. Along with these occurs theissue of trust. If data is shared with an unwarranted device, the probability of data security reduces automatically. [8]. VI. Conclusions In this Paper we have gathered the information about the pervasive computing technologies, architec- ture, applications, issues and challenges we have seen, today the pervasive/ubiquitous computing is a fertile source of challenging problems in computer systems. In future we focus our research for creating applications such as smart home or office or university etc.without any technical challenges by using the advanced embedded systems or by efficient soft computing techniques.devices need to be perceived as portals into the applica- tion/data space supported by the environment, rather than repositories of custom software. Applications need to
  • 8. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 93 | Page be seen as tasks performed on behalf of a user, not as programs written to exploit the resources of a specific computer. The goal of a pervasive computing framework is to support services offered by entities in a heteroge- neous environment. It is highly probable that most entities havelittle or no knowledge of other entities and the services they offer. This introduces important security issues especially when a new entity makes available a new servicefor the first time.As a result of this 'unknown' factor introduced in this environment, there is astrong expectation for a pervasive computing framework to provide adequate security to all entities. The framework is transparent to these entities and as such they appear to communicate peer-to-peer. Unless entities are aware of appropriate security mechanisms, there may be reluctance for these to connect to the framework and avail of services in offer. References [1]. http://en.wikipedia.org/wiki/Pervasive_Computing [2]. Lathies Bhasker T “Pervasive Computing Issues, Challenges andApplications”International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 2 Issue 12, Dec.2013. [3]. “Security Issues with Pervasive Computing Frameworks” Michael CollinsSystems Research Group, School of Computer Science and Informatics,UCD Dublin, Ireand. [4]. ”Issues and challenges in ubiqutious computing” Protocol Engineering & Technology (PET) Lab. Indian Institute of Science,Bangalore. [5]. https://www.google.co.in/search?q=pervasive+compuing+characteristics&biw. [6]. A Survey on Pervasive Computing Er. Manita Gorai, Er. Kamna Agarwal , International Journal of Scientific & Engineering Re- search Volume 3, Issue 6, June-2012 [7]. M. Satyanarayanan: Pervasive Computing: Vision and Challenges. IEEE Personel Communications, 2001