SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 86-93
www.iosrjournals.org
DOI: 10.9790/0661-17328693 www.iosrjournals.org 86 | Page
Pervasive Computing Applications And Its Security Issues &
Challenges
R.Uma, G.Archana, V.Komail.
Assistant Professors, Department Of Computer Applications, Dhanalakshmi Srinivasan College of Arts &
Science for Women Perambalur.
Assistant Professors, Dept of MCA, Dhanalakshmi Srinivasan college of arts and science for women
Perambalur,
Abstract: This paper discusses the emerging field of pervasive computing applications and its security
challenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace,
anywhere, at any time service to small or portable and wearable devices. This technology create new
opportunities and challenges for the Information Technology companies to place high-performance computers
and sensors in virtually every device, appliance, and piece of equipment in buildings, home care,Intelligent
transport system, workplaces, and factories, and even in clothing. Pervasive computing environment or PCE
share most of the security issues of traditional networked applications. These include authentication of devices
and users, privacy of data or information, defense against malicious code such as viruses, worms, Trojan horses
etc, and access control mechanisms. Finally it describes about the future focus for the pervasive computing
through the real time applications.
Keywords: Pervasive computing,Devices,Connectivity,Issues,Privacy,User Interfaces.
I. Introduction
The Pervasive computing encompasses three things all of the areas: 1. It concerns the way people view
mobile computing devices, and use them within their environments to perform tasks. 2. It concerns the way ap-
plications are created and deployed to enable such tasks to be performed.3.It concerns the environment and how
it is enhanced by the emergence and ubiquity of new information and functionality. The advantage of pervasive
computing environments is to make life more comfortable by providing device mobility and a digital infrastruc-
ture that has the ability to provide useful services to people in the environment, when and where they need them.
At the same time pervasive computing presents many risks and security related issues that were not previously
encountered in more traditional computing environments. In particular, issues such as privacy, trust and identity
become more challenging to the designers of such environments. Designing secure pervasive environments re-
quires the system to reliably confidently identify the user who wishes to access the environment’s resources. It
is also
Important to appreciate the risks involved in establishing and verifying the identity of users insuch en-
vironments. Privacy is also important as users need to be confident that their personal information is not used in
a way that they do not approve of. Privacy in such environments is particularly important as the syste needs to
be protective of the users’ data and perceived by the user to be that way.
II. Characteristics and Architecture of Pervasive Computing
Pervasive computing can be classified by a set ofattributes and capabilities that describe the extent of
itsfunctionality. Mobility and ad-hoc networking capabilities are expected to emerge relatively soon, that is
within the next one to two years. [1]Characteristics such as autonomy, context awareness and energy autarky are
not expected until later, taking anywhere from five to ten years. Context awareness and embededt in day-to-day
objects are viewed as pervasivecomputing’s ultimate and determining characteristics. Pervasive computing is
the result of computer technology advancing at exponential speeds -- a trend toward all man-made and some
natural products having hardware and software. [2]Pervasive computing goes beyond the realm of personal
computers: it is the idea that almost any device, from clothing to tools to appliances to cars to homes to the hu-
man body to your coffee mug, can be imbedded with chips to connect the device to aninfinite network of other
devices. The goal of pervasive computing, which combines current network technologies with wireless compu-
ting, voice recognition, Internet capability and artificial intelligence, is to create an environment where the con-
nectivity of devices is embedded in such a way that the connectivity is unobtrusive and always available.
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 87 | Page
III. Pervasive Computing Applications
Pervasive computing could be exploited to achieve great societal, organizational and individual bene-
fits. [3]The high-level goals of such applications mostly center on Quality of Life, Quality of Experience, Con-
venience, Return on Investment, Assistance, among others. The Mobile and Pervasive Computing laboratory is
a pioneer and one of the world leading research centers in applying pervasive computing in support of Aging,
Disabilities and Independence (ADI) addressing Quality of Life for the elderly and individuals with special
needs. ADI research is highly multi-disciplinary and requires diversified research talents that cannot be attained
without research collaborations (including international). The lab also addresses proactive health applications of
pervasive computing with emphasize on persuasive tele-health systems, which is another multi-disciplinary re-
search area.
Smart Greenhouse It is a natural air purifying system that utilises plants that havenaturally powerful air purify-
ing qualities in a mini greenhouse in the house, which provides fresh air and a pleasant natural scent.
The greenhouse automatically controls the climate to adjust the plants purifying abilities in order to provide
adequate freshness according to the contamination level of the house.
The Smart Floor
[4]The primary location tracking system used in the house is the Smart Floor, which is built into a resi-
dential-grade, raised tile system. Each tile is approximately one square foot with a pressure sensor fitted under-
neath. Unlike other tracking methods, the Smart Floor requires no attention from the residents, any device to
wear, or cameras that invade the residents’ privacy. To the user, the Smart Floor is very convenient as it is unen-
cumbered and requires no user attention. To the Smart House, the Smart Floor is very powerful as it provides for
rich sentience of location and activities, quietly and invisibly.
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 88 | Page
The Smart Floor is utilized as a collection of location and activity services (API) to other smart house
applications. Applications may need location contexts in which case they invoke the location service. Some ap-
plications are entirely based on locations such as daily activity counter, in which the total steps taken by the res-
ident are counted and reported to the cloud and other subscribers (e.g. care giver, or a relative). A phenomena
cloud implementation of the location service is also available which provides for a higher level of reliability of
the location service despite sensor failures and high levels of noise exhibited by the pressure sensors.
SMART PEN [4][[[:Smart pen offers a way of finding a definition for any unknown vocabulary when people
have problems reading books .
This is especially useful for documents written in a foreign language. All you need to do is underline or
write down the unknown word, press the translation key and then the pen automatically projects the translation
onto the document in.
The Smartwave: Meal Preparation Assistant
The SmartWave is a consists of a microwave oven and other devices and services that provide assis-
tance in meal preparation. An RFID reader mounted under a counter surface below the microwave allows ap-
propriately tagged frozen meals to be recognized by the SmartWave. The resident is provided via a monitor
above the microwave with the necessary instructions to ready the meal for cooking (remove film, stir ingre-
dients, etc.). The SmartWave can handle multiple cooking cycles (e.g. thaw, low-power followed by high power)
automatically. It sets power levels and cooking times automatically. Once the meal is ready, a notification is sent
to the resident, wherever he or she is in the house. This technology assists a variety of residents, such as those
with visual impairments who are unable to read the fine print on the frozen meals. It also assists residents with
hand dexterity problems or with mild dementia.
Cognitive Assistant
The main goal of the Cognitive Assistant (CA) project is to assist older adults with mild dementia over-
come difficulties in carrying out basic daily activities by means of reminders, orientation, and context-sensitive
triggering. Indoor, the cognitive assistant provides: (1) Attention Capture and (2) anywhere multimedia cueing
capabilities. The assistant itself is a general service decoupled from the specific contents and events of interests.
It can be utilized by any number of applications in the Smart House requiring any type of reminders, training, or
cueing. The CA has been used proactively as a reminder for critical tasks (to take medications, to eat at meal
times, to go see the doctor, to call son on his birthday, or to feed the pet). It has also been used as a training tool
to perform step-by-step tasks (specifically in re-training on hygiene tasks). Another purpose for training is beha-
vior alteration, which we demonstrated in preparing a meal using the SmartWave and ensuring hydration. CA
has also been used as a monitoring tool to record the activities performed by the elder.
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 89 | Page
Smart Plug
An intelligent environment should be able to sense and recognize the devices and services it has availa-
ble, interpret their status, and if needed interact with these devices to influence them. For example, in the Gator
Tech Smart House, self-sensing is a service that provides a real-time model that reflects the status of all the ap-
pliances in the space. The SmartPlug is a prerequisite service that enables self-sensing. The Smart Plug is a
standard power outlet invisibly fitted with a low-cost RFID reader housed inside the wall behind the plug hard-
ware. Each electrical device, such as a lamp or a fan, is given an RFID tag that contains information about the
device. Currently, the RFID tags are embedded in pass through plugs (the white cubical below). Once an ap-
pliance is plugged (through the pass through cube), its RFID tag is read and its location id identified. The house
gets to know this dynamic information instantaneously. By attaching a sensor node to the plug, actuation be-
comes possible. Actuations are limited to on/off switching of the appliance
Smart Bed
It can be difficult in this modern age for busy working people to feel good and peaceful when they
must get up early in the morning, but with smart bed, you can turn a stressful morning into an enjoyable one.
Smart Pillow
A pillow that could look after your bed time needs.
Smart pillow can read any books of your choice to you at bedtime and can play your favourite music to drift off
to when you start to get sleepy.
Cyber-Analytic Tele-Health
Researchers in the social and life sciences, as well as medical researchers and practitioners, have long
sought the ability to continuously and automaticallymonitor research subjects or patients for a variety of condi-
tions or disorders. Additionally, the use of monitoring data to influence treatment dosage or regimen within real-
time constraints is an important objective of behavior modification practice for psychological and medical ther-
apies. The Mobile and Pervasive Computing lab has formed a multi-disciplinary team to research tele-health
systems in the domain of obesity and diabetes. We have analyzed the traditional model for tele-health and de-
veloped key advances to the model that we believe will invigorate tele-health as an effective delivery mode for
health care. Our work so far addressed the need to extend tele-health systems with two powerful capabilities: (1)
behavior recognition, which is powerful sentience over and above vital signs and activity sensing, and (2) persu-
asion and adaptive persuasion loops, which is powerful (human) actuation. We believe that both additions (sen-
tience and actuation) will have significant impact on the effectiveness and efficacy of tele-health systems. We
are currently working on behavior recognition, Action Behavior Models for persuasion and participatory tele-
health. We are also planning for a major validation and quantification of our hypotheses.
Gate Reminder (DESK)
Forgetting an important item at home that you need for your day is something that happens to the best
of us.But now, this innovative Gate reminder will remind you what you need before you leave the house, so you
will never need to forget anything again.
Smart Dressing Table
The smart dressing table is the perfect accessory for women who are fed up with having to put their
makeupon in the morning in a bad and dark environment. This dressing table has several innovative functions
that work with the user to create a perfect and convenient atmosphere for putting up makeup on quickly and
effectively.
Digi Flower
It is a cordless communication system that indicates whether or not any member of the family is ap-
proaching the home.As well as improving communication and general relationships within the family, it also
provides general convenienc eand can also act as a safety device. It is composed of a portable transmiter and a
receiver.This device indicates by bursting into bloom when a family member approaches the house.This innova-
tion can act as a new communication interface for the people both inside and outside the house.
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 90 | Page
Electronic Paper And Smart Wall
The days of paper books and newspapers what they are going to be replaced with, according to some-
entrepreneurs, is “epaper”.It is basically a computer monitor that is so thin that you could roll it up and stick it
in your pocket. One of the problems when changing a display is the size.How can we utilise the size of a display
effectively when it is constantly getting bigger.
Smart Mat
A mat at the entrance of home, provides a vital connection between inside and outside the house.By
sensing the body weight and footprint of the user, the smart mat immediately recognises which user isstepping
on the mat.
Pervasive Computing in Healthcare
Pervasive computing is often mentioned in the context of improving healthcare.Usually, these exam-
ples involve consumer monitoring devices such as bloodpressure cuffs and glucose meters that can upload data
to a personal computer for collection and dissemination to professional caregivers.By collecting patient data in
settings more varied than doctors’offices, healthcare provider shope to better understand themany facets of pa-
tients’ daily gives and then modify the rapies to the individual.Another important context is emergency care to
accelerate access to medical records at the emergency site or to bring experts to the scene virtually. By giving
medical professionals appropriate,complete information,we expect to deliver better care that’s tuned not only to
the situation but also to the patient’s history.The surgical field also receives much attention,as surgeons and
nurses must monitor and controlvarious vital functions under intensely stressful conditions. Technologists are
developing systemsto collect and process an ever-increasing range of telemetry from instruments used in an
operating room and to augment human ability to detect patterns of concern that could require immediate action.
A promising future
Many of these applications have appeared in the popular press and are actually starting to be dep-
loyed.At one end of the spectrum, consumer devices easily network with home PCs to let users gather data from
sensors in the home that their physicians can access online. At the other end, telesurgery is becoming a practical
reality, with remote physicians able to consult on a patient’s conditionas well as take part in a surgical proce-
dure.This special issue seeks to go beyond these“expected” applications and bring the reader an even wider
range of applicability for pervasivecomputing technologies in the highly variedhealthcare domain.Proponents
tout pervasive computing as benefiting healthcare in at least three ways:
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 91 | Page
1. Lowering costs by getting appropriate care tothe people who need it much faster than previously possible;
2. Making expert care accessible to more people, there by increasing the scale at which first-rate healthcare is
applied;
3. Making healthcare more personalized, prompting individuals to take more responsibility for maintaining their
health.
IV. Security Challenges In Pervasive Computing Environment
Pervasive computing environment or PCE share most of the security issues of traditional networked
applications. These include authentication of devices and users, privacy of data or information, defense against
malicious code such as viruses, worms, Trojan horses etc, and access control mechanisms. However, the perva-
sive computing environment adds some unique issues to the already complex security arena. Physical security is
important as the devices can be easily misplaced or stolen. Information that is usually confined behind a corpo-
rate firewall is now winging its way through the air, possibly spending some time on hosted servers or wireless
gateways.
V. Security issues
Many attempts have been made to apply traditional security concepts and solutions to pervasive plat-
forms. However, in most cases, a lot of modifications are needed inorder for the security infrastructure to fit
within the pervasive framework leading to a high level of risk of introducing new breaches. A generic security
framework is needed [5]. One way to minimise the security issues with pervasive computing frameworks is to
identify them in the early stages of their development. These issues include:
5.1 Reliability
Pervasive systems expose a larger attack surface with many points of failure in comparison to tradi-
tional computing environments [2]. If people depend upon pervasive systems to mediate day-to-day activities,
such systems will quickly become missioncritical.They need to be robust, dependable, and always available.
This is a very difficult problem for a pervasive computing framework to address. Due to the wide variety of
computing technologies that entities will use, the risk of introducing security issues that may threaten the relia-
bility of services will increase.
5.2 Trust
The infrastructure that supports a pervasive computing system introduces new security challenges not
addressed in existing security models, including in the domain of trust management [6, 7]. The issue of trust will
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 92 | Page
arise when anentity, such as a PDA, mobile phone or laptop computer that is unknown to otherentities offers
services. Entities offering services may have an established connection history and are trusted. An entity con-
necting to a pervasive environment for the first time will have no historical records on which to base a measure
of trust. Such an entity may act maliciously and try to disrupt services being offered or it may be genuinely try-
ing to avail of a specific service. The question of trust arises and whether existing members of the environment
trust the intentions of this new entity. For example, two new entities (A and B) that are connected to the perva-
sive environment may wish exchange data. Do they trust each other? to traditional computing environments [2].
If people depend upon pervasive systems to mediate day-to-day activities, such systems will quickly become
mission critical.They need to be robust, dependable, and always available. This is a very difficult problem for a
pervasive computing framework to address. Due to the wide variety of computing technologies that entities will
use, the risk of introducing security issues that may threaten the reliability of services will increase.
5.3 Malicious attacks
A common form of malicious attack is a Denial of Service (DoS) attack. A DoS is anattack with the
purpose of preventing legitimate users from using a specfied network resource such as a website, web service, or
computer system [9]. A Distributed Denialof Service (DDoS) attack is a coordinated attack on the availability of
services ofa given target system or network that is launched indirectly through many compromised computing
systems [10]. The threat of a deliberate attack by an entity connectedto a pervasive computing framework will
exist. Any entity can act maliciouslyand may deliberately try to access a service provided by another entity that
it is not permitted. A DoS attack can not only cause the innocent entity to malfunction but may also introduce
other problems such as severe network latency, scalability problems when other entities try to connect to the
framework and service unavailability.
5.4 Information propagation
When data is transmitted between entities, it is possible that it may be altered or corrupted accidentally
or maliciously. It is important that the integrity of the data in apervasive environment is maintained. If the data
is altered, the entities may not have any mechanism to detect this.
5.5 Recourse
Ranganathan states that because pervasive systems will mediate everyday physicalactivity, technical
mechanisms to facilitate recourse must be built-in from the start[2]. When one entity provides a service to
another, the problem exists when one of the entities reneges before a successful termination. A pervasive com-
puting frameworkshould have mechanisms to deal with this.In the next section we introduce an example of a
pervasive computing framework called ConStruct. We use this to motivate discussion ofhow security issues
impact services that are supported in a pervasive environment.
5.6 Data Communication
Privacy of the data encompasses two aspects. First, it hasto ensure that data being shared or communi-
cated is not being hacked by any active or passive attackers. As aninitial thought, we consider several encryption
and decryption techniques. But at the same time we need to think about the other side of the coin which reminds
us about the memory, battery power and other limitations.Along with that, the users in pervasive computing
environment have much more elasticity and sovereignty in mobility. This includes a large variety of domains
ranging from well protected environments to totally open unprotected situations which makes the data protect its
issue worse. Secondly, how can it be guaranteed that theuser data which is being collected almost obviously
willnot be used maliciously? Or how we can ensure with certainty that the complicated data is not being proces-
sedby any unauthorized user
5.7 Trust
In order to overcome several constraints, mutualcooperation, interconnectedness and inter dependabilityhave
been exposed as the obvious uniqueness of pervasivecomputing environment. Along with these occurs theissue
of trust. If data is shared with an unwarranted device, the probability of data security reduces automatically. [8].
VI. Conclusions
In this Paper we have gathered the information about the pervasive computing technologies, architec-
ture, applications, issues and challenges we have seen, today the pervasive/ubiquitous computing is a fertile
source of challenging problems in computer systems. In future we focus our research for creating applications
such as smart home or office or university etc.without any technical challenges by using the advanced embedded
systems or by efficient soft computing techniques.devices need to be perceived as portals into the applica-
tion/data space supported by the environment, rather than repositories of custom software. Applications need to
Pervasive Computing Applications And Its Security Issues & Challenges
DOI: 10.9790/0661-17328693 www.iosrjournals.org 93 | Page
be seen as tasks performed on behalf of a user, not as programs written to exploit the resources of a specific
computer. The goal of a pervasive computing framework is to support services offered by entities in a heteroge-
neous environment. It is highly probable that most entities havelittle or no knowledge of other entities and the
services they offer. This introduces important security issues especially when a new entity makes available a
new servicefor the first time.As a result of this 'unknown' factor introduced in this environment, there is astrong
expectation for a pervasive computing framework to provide adequate security to all entities. The framework is
transparent to these entities and as such they appear to communicate peer-to-peer. Unless entities are aware of
appropriate security mechanisms, there may be reluctance for these to connect to the framework and avail of
services in offer.
References
[1]. http://en.wikipedia.org/wiki/Pervasive_Computing
[2]. Lathies Bhasker T “Pervasive Computing Issues, Challenges andApplications”International Journal Of Engineering And Computer
Science ISSN: 2319-7242 Volume 2 Issue 12, Dec.2013.
[3]. “Security Issues with Pervasive Computing Frameworks” Michael CollinsSystems Research Group, School of Computer
Science and Informatics,UCD Dublin, Ireand.
[4]. ”Issues and challenges in ubiqutious computing” Protocol Engineering & Technology (PET) Lab. Indian Institute of
Science,Bangalore.
[5]. https://www.google.co.in/search?q=pervasive+compuing+characteristics&biw.
[6]. A Survey on Pervasive Computing Er. Manita Gorai, Er. Kamna Agarwal , International Journal of Scientific & Engineering Re-
search Volume 3, Issue 6, June-2012
[7]. M. Satyanarayanan: Pervasive Computing: Vision and Challenges. IEEE Personel Communications, 2001

More Related Content

What's hot

Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
Vishwajeet Vatharkar
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Bhupender Singh Jadon
 
Ubiquitous home
Ubiquitous homeUbiquitous home
Ubiquitous home
swati sonawane
 
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...From Non-Intelligent to Intelligent Environments: a Computational and Ambient...
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...
Ahmad Lotfi
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
Mary Margarat
 
Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...
IJERD Editor
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
Raquel Salcedo Gomes
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Daniel Kornev
 
Properties of ubiquitous computing
Properties of ubiquitous computingProperties of ubiquitous computing
Properties of ubiquitous computing
Purvi Sankhe
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
Arpan Patel
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
Rui M. Barreira
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Anshuman Biswal
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
Honeyson Joseph
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
Sweety Singh
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
Nikhil Patteri
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Kelly Zhang
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Priti Punia
 
Project oxygen seminar report
Project oxygen seminar reportProject oxygen seminar report
Project oxygen seminar report
niharmishra13
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
Rutvik Pensionwar
 
5 context aware services
5 context aware services5 context aware services
5 context aware services
guest3cf4991
 

What's hot (20)

Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous home
Ubiquitous homeUbiquitous home
Ubiquitous home
 
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...From Non-Intelligent to Intelligent Environments: a Computational and Ambient...
From Non-Intelligent to Intelligent Environments: a Computational and Ambient...
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
 
Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...Security and Privacy Consideration for Internet of Things in Smart Home Envir...
Security and Privacy Consideration for Internet of Things in Smart Home Envir...
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Properties of ubiquitous computing
Properties of ubiquitous computingProperties of ubiquitous computing
Properties of ubiquitous computing
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Project oxygen seminar report
Project oxygen seminar reportProject oxygen seminar report
Project oxygen seminar report
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
5 context aware services
5 context aware services5 context aware services
5 context aware services
 

Viewers also liked

E1302022628
E1302022628E1302022628
E1302022628
IOSR Journals
 
N012628790
N012628790N012628790
N012628790
IOSR Journals
 
L018137479
L018137479L018137479
L018137479
IOSR Journals
 
J017667582
J017667582J017667582
J017667582
IOSR Journals
 
A012640108
A012640108A012640108
A012640108
IOSR Journals
 
D010341722
D010341722D010341722
D010341722
IOSR Journals
 
Development of an Algorithm for 16-Bit WTM
Development of an Algorithm for 16-Bit WTMDevelopment of an Algorithm for 16-Bit WTM
Development of an Algorithm for 16-Bit WTM
IOSR Journals
 
Dynamic Programming approach in Two Echelon Inventory System with Repairable ...
Dynamic Programming approach in Two Echelon Inventory System with Repairable ...Dynamic Programming approach in Two Echelon Inventory System with Repairable ...
Dynamic Programming approach in Two Echelon Inventory System with Repairable ...
IOSR Journals
 
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure CommunicationA Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
IOSR Journals
 
An Estimate of Thermal Comfort in North-Central Region of Nigeria
An Estimate of Thermal Comfort in North-Central Region of NigeriaAn Estimate of Thermal Comfort in North-Central Region of Nigeria
An Estimate of Thermal Comfort in North-Central Region of Nigeria
IOSR Journals
 
C017261823
C017261823C017261823
C017261823
IOSR Journals
 
J010528691
J010528691J010528691
J010528691
IOSR Journals
 
Large Span Lattice Frame Industrial Roof Structure
Large Span Lattice Frame Industrial Roof StructureLarge Span Lattice Frame Industrial Roof Structure
Large Span Lattice Frame Industrial Roof Structure
IOSR Journals
 
G017544855
G017544855G017544855
G017544855
IOSR Journals
 
J1303026471
J1303026471J1303026471
J1303026471
IOSR Journals
 
K013128090
K013128090K013128090
K013128090
IOSR Journals
 
Practical Investigation of the Environmental Hazards of Idle Time and Speed o...
Practical Investigation of the Environmental Hazards of Idle Time and Speed o...Practical Investigation of the Environmental Hazards of Idle Time and Speed o...
Practical Investigation of the Environmental Hazards of Idle Time and Speed o...
IOSR Journals
 
I010425559
I010425559I010425559
I010425559
IOSR Journals
 
G017513945
G017513945G017513945
G017513945
IOSR Journals
 
O130303104110
O130303104110O130303104110
O130303104110
IOSR Journals
 

Viewers also liked (20)

E1302022628
E1302022628E1302022628
E1302022628
 
N012628790
N012628790N012628790
N012628790
 
L018137479
L018137479L018137479
L018137479
 
J017667582
J017667582J017667582
J017667582
 
A012640108
A012640108A012640108
A012640108
 
D010341722
D010341722D010341722
D010341722
 
Development of an Algorithm for 16-Bit WTM
Development of an Algorithm for 16-Bit WTMDevelopment of an Algorithm for 16-Bit WTM
Development of an Algorithm for 16-Bit WTM
 
Dynamic Programming approach in Two Echelon Inventory System with Repairable ...
Dynamic Programming approach in Two Echelon Inventory System with Repairable ...Dynamic Programming approach in Two Echelon Inventory System with Repairable ...
Dynamic Programming approach in Two Echelon Inventory System with Repairable ...
 
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure CommunicationA Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
 
An Estimate of Thermal Comfort in North-Central Region of Nigeria
An Estimate of Thermal Comfort in North-Central Region of NigeriaAn Estimate of Thermal Comfort in North-Central Region of Nigeria
An Estimate of Thermal Comfort in North-Central Region of Nigeria
 
C017261823
C017261823C017261823
C017261823
 
J010528691
J010528691J010528691
J010528691
 
Large Span Lattice Frame Industrial Roof Structure
Large Span Lattice Frame Industrial Roof StructureLarge Span Lattice Frame Industrial Roof Structure
Large Span Lattice Frame Industrial Roof Structure
 
G017544855
G017544855G017544855
G017544855
 
J1303026471
J1303026471J1303026471
J1303026471
 
K013128090
K013128090K013128090
K013128090
 
Practical Investigation of the Environmental Hazards of Idle Time and Speed o...
Practical Investigation of the Environmental Hazards of Idle Time and Speed o...Practical Investigation of the Environmental Hazards of Idle Time and Speed o...
Practical Investigation of the Environmental Hazards of Idle Time and Speed o...
 
I010425559
I010425559I010425559
I010425559
 
G017513945
G017513945G017513945
G017513945
 
O130303104110
O130303104110O130303104110
O130303104110
 

Similar to O017328693

Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
Ahmad Sharifi
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
Hatum Hussain
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
Hatum Hussain
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
ijccsa
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduino
neirew J
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
Lovely Singla
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
Pravallika Reddy
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
ShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
ShailiPal1
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
Rutvik Pensionwar
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Pallav Kumar
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
journal ijrtem
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Sangeetha Sg
 
IRJET- Smart Sensory Furniture
IRJET-  	  Smart Sensory FurnitureIRJET-  	  Smart Sensory Furniture
IRJET- Smart Sensory Furniture
IRJET Journal
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Md.Jamilur Rahman
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
RishabhRathore71
 
Pervasive computing.pptx
Pervasive computing.pptxPervasive computing.pptx
Pervasive computing.pptx
RishabhRathore71
 
50120140502006
5012014050200650120140502006
50120140502006
IAEME Publication
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
deaneal
 
PPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in NursingPPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in Nursing
ArchanaSelvan
 

Similar to O017328693 (20)

Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduino
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
IRJET- Smart Sensory Furniture
IRJET-  	  Smart Sensory FurnitureIRJET-  	  Smart Sensory Furniture
IRJET- Smart Sensory Furniture
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Pervasive computing.pptx
Pervasive computing.pptxPervasive computing.pptx
Pervasive computing.pptx
 
50120140502006
5012014050200650120140502006
50120140502006
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
PPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in NursingPPT on Cutting Edge Technology Demonstration in Nursing
PPT on Cutting Edge Technology Demonstration in Nursing
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

O017328693

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 86-93 www.iosrjournals.org DOI: 10.9790/0661-17328693 www.iosrjournals.org 86 | Page Pervasive Computing Applications And Its Security Issues & Challenges R.Uma, G.Archana, V.Komail. Assistant Professors, Department Of Computer Applications, Dhanalakshmi Srinivasan College of Arts & Science for Women Perambalur. Assistant Professors, Dept of MCA, Dhanalakshmi Srinivasan college of arts and science for women Perambalur, Abstract: This paper discusses the emerging field of pervasive computing applications and its security challenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace, anywhere, at any time service to small or portable and wearable devices. This technology create new opportunities and challenges for the Information Technology companies to place high-performance computers and sensors in virtually every device, appliance, and piece of equipment in buildings, home care,Intelligent transport system, workplaces, and factories, and even in clothing. Pervasive computing environment or PCE share most of the security issues of traditional networked applications. These include authentication of devices and users, privacy of data or information, defense against malicious code such as viruses, worms, Trojan horses etc, and access control mechanisms. Finally it describes about the future focus for the pervasive computing through the real time applications. Keywords: Pervasive computing,Devices,Connectivity,Issues,Privacy,User Interfaces. I. Introduction The Pervasive computing encompasses three things all of the areas: 1. It concerns the way people view mobile computing devices, and use them within their environments to perform tasks. 2. It concerns the way ap- plications are created and deployed to enable such tasks to be performed.3.It concerns the environment and how it is enhanced by the emergence and ubiquity of new information and functionality. The advantage of pervasive computing environments is to make life more comfortable by providing device mobility and a digital infrastruc- ture that has the ability to provide useful services to people in the environment, when and where they need them. At the same time pervasive computing presents many risks and security related issues that were not previously encountered in more traditional computing environments. In particular, issues such as privacy, trust and identity become more challenging to the designers of such environments. Designing secure pervasive environments re- quires the system to reliably confidently identify the user who wishes to access the environment’s resources. It is also Important to appreciate the risks involved in establishing and verifying the identity of users insuch en- vironments. Privacy is also important as users need to be confident that their personal information is not used in a way that they do not approve of. Privacy in such environments is particularly important as the syste needs to be protective of the users’ data and perceived by the user to be that way. II. Characteristics and Architecture of Pervasive Computing Pervasive computing can be classified by a set ofattributes and capabilities that describe the extent of itsfunctionality. Mobility and ad-hoc networking capabilities are expected to emerge relatively soon, that is within the next one to two years. [1]Characteristics such as autonomy, context awareness and energy autarky are not expected until later, taking anywhere from five to ten years. Context awareness and embededt in day-to-day objects are viewed as pervasivecomputing’s ultimate and determining characteristics. Pervasive computing is the result of computer technology advancing at exponential speeds -- a trend toward all man-made and some natural products having hardware and software. [2]Pervasive computing goes beyond the realm of personal computers: it is the idea that almost any device, from clothing to tools to appliances to cars to homes to the hu- man body to your coffee mug, can be imbedded with chips to connect the device to aninfinite network of other devices. The goal of pervasive computing, which combines current network technologies with wireless compu- ting, voice recognition, Internet capability and artificial intelligence, is to create an environment where the con- nectivity of devices is embedded in such a way that the connectivity is unobtrusive and always available.
  • 2. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 87 | Page III. Pervasive Computing Applications Pervasive computing could be exploited to achieve great societal, organizational and individual bene- fits. [3]The high-level goals of such applications mostly center on Quality of Life, Quality of Experience, Con- venience, Return on Investment, Assistance, among others. The Mobile and Pervasive Computing laboratory is a pioneer and one of the world leading research centers in applying pervasive computing in support of Aging, Disabilities and Independence (ADI) addressing Quality of Life for the elderly and individuals with special needs. ADI research is highly multi-disciplinary and requires diversified research talents that cannot be attained without research collaborations (including international). The lab also addresses proactive health applications of pervasive computing with emphasize on persuasive tele-health systems, which is another multi-disciplinary re- search area. Smart Greenhouse It is a natural air purifying system that utilises plants that havenaturally powerful air purify- ing qualities in a mini greenhouse in the house, which provides fresh air and a pleasant natural scent. The greenhouse automatically controls the climate to adjust the plants purifying abilities in order to provide adequate freshness according to the contamination level of the house. The Smart Floor [4]The primary location tracking system used in the house is the Smart Floor, which is built into a resi- dential-grade, raised tile system. Each tile is approximately one square foot with a pressure sensor fitted under- neath. Unlike other tracking methods, the Smart Floor requires no attention from the residents, any device to wear, or cameras that invade the residents’ privacy. To the user, the Smart Floor is very convenient as it is unen- cumbered and requires no user attention. To the Smart House, the Smart Floor is very powerful as it provides for rich sentience of location and activities, quietly and invisibly.
  • 3. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 88 | Page The Smart Floor is utilized as a collection of location and activity services (API) to other smart house applications. Applications may need location contexts in which case they invoke the location service. Some ap- plications are entirely based on locations such as daily activity counter, in which the total steps taken by the res- ident are counted and reported to the cloud and other subscribers (e.g. care giver, or a relative). A phenomena cloud implementation of the location service is also available which provides for a higher level of reliability of the location service despite sensor failures and high levels of noise exhibited by the pressure sensors. SMART PEN [4][[[:Smart pen offers a way of finding a definition for any unknown vocabulary when people have problems reading books . This is especially useful for documents written in a foreign language. All you need to do is underline or write down the unknown word, press the translation key and then the pen automatically projects the translation onto the document in. The Smartwave: Meal Preparation Assistant The SmartWave is a consists of a microwave oven and other devices and services that provide assis- tance in meal preparation. An RFID reader mounted under a counter surface below the microwave allows ap- propriately tagged frozen meals to be recognized by the SmartWave. The resident is provided via a monitor above the microwave with the necessary instructions to ready the meal for cooking (remove film, stir ingre- dients, etc.). The SmartWave can handle multiple cooking cycles (e.g. thaw, low-power followed by high power) automatically. It sets power levels and cooking times automatically. Once the meal is ready, a notification is sent to the resident, wherever he or she is in the house. This technology assists a variety of residents, such as those with visual impairments who are unable to read the fine print on the frozen meals. It also assists residents with hand dexterity problems or with mild dementia. Cognitive Assistant The main goal of the Cognitive Assistant (CA) project is to assist older adults with mild dementia over- come difficulties in carrying out basic daily activities by means of reminders, orientation, and context-sensitive triggering. Indoor, the cognitive assistant provides: (1) Attention Capture and (2) anywhere multimedia cueing capabilities. The assistant itself is a general service decoupled from the specific contents and events of interests. It can be utilized by any number of applications in the Smart House requiring any type of reminders, training, or cueing. The CA has been used proactively as a reminder for critical tasks (to take medications, to eat at meal times, to go see the doctor, to call son on his birthday, or to feed the pet). It has also been used as a training tool to perform step-by-step tasks (specifically in re-training on hygiene tasks). Another purpose for training is beha- vior alteration, which we demonstrated in preparing a meal using the SmartWave and ensuring hydration. CA has also been used as a monitoring tool to record the activities performed by the elder.
  • 4. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 89 | Page Smart Plug An intelligent environment should be able to sense and recognize the devices and services it has availa- ble, interpret their status, and if needed interact with these devices to influence them. For example, in the Gator Tech Smart House, self-sensing is a service that provides a real-time model that reflects the status of all the ap- pliances in the space. The SmartPlug is a prerequisite service that enables self-sensing. The Smart Plug is a standard power outlet invisibly fitted with a low-cost RFID reader housed inside the wall behind the plug hard- ware. Each electrical device, such as a lamp or a fan, is given an RFID tag that contains information about the device. Currently, the RFID tags are embedded in pass through plugs (the white cubical below). Once an ap- pliance is plugged (through the pass through cube), its RFID tag is read and its location id identified. The house gets to know this dynamic information instantaneously. By attaching a sensor node to the plug, actuation be- comes possible. Actuations are limited to on/off switching of the appliance Smart Bed It can be difficult in this modern age for busy working people to feel good and peaceful when they must get up early in the morning, but with smart bed, you can turn a stressful morning into an enjoyable one. Smart Pillow A pillow that could look after your bed time needs. Smart pillow can read any books of your choice to you at bedtime and can play your favourite music to drift off to when you start to get sleepy. Cyber-Analytic Tele-Health Researchers in the social and life sciences, as well as medical researchers and practitioners, have long sought the ability to continuously and automaticallymonitor research subjects or patients for a variety of condi- tions or disorders. Additionally, the use of monitoring data to influence treatment dosage or regimen within real- time constraints is an important objective of behavior modification practice for psychological and medical ther- apies. The Mobile and Pervasive Computing lab has formed a multi-disciplinary team to research tele-health systems in the domain of obesity and diabetes. We have analyzed the traditional model for tele-health and de- veloped key advances to the model that we believe will invigorate tele-health as an effective delivery mode for health care. Our work so far addressed the need to extend tele-health systems with two powerful capabilities: (1) behavior recognition, which is powerful sentience over and above vital signs and activity sensing, and (2) persu- asion and adaptive persuasion loops, which is powerful (human) actuation. We believe that both additions (sen- tience and actuation) will have significant impact on the effectiveness and efficacy of tele-health systems. We are currently working on behavior recognition, Action Behavior Models for persuasion and participatory tele- health. We are also planning for a major validation and quantification of our hypotheses. Gate Reminder (DESK) Forgetting an important item at home that you need for your day is something that happens to the best of us.But now, this innovative Gate reminder will remind you what you need before you leave the house, so you will never need to forget anything again. Smart Dressing Table The smart dressing table is the perfect accessory for women who are fed up with having to put their makeupon in the morning in a bad and dark environment. This dressing table has several innovative functions that work with the user to create a perfect and convenient atmosphere for putting up makeup on quickly and effectively. Digi Flower It is a cordless communication system that indicates whether or not any member of the family is ap- proaching the home.As well as improving communication and general relationships within the family, it also provides general convenienc eand can also act as a safety device. It is composed of a portable transmiter and a receiver.This device indicates by bursting into bloom when a family member approaches the house.This innova- tion can act as a new communication interface for the people both inside and outside the house.
  • 5. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 90 | Page Electronic Paper And Smart Wall The days of paper books and newspapers what they are going to be replaced with, according to some- entrepreneurs, is “epaper”.It is basically a computer monitor that is so thin that you could roll it up and stick it in your pocket. One of the problems when changing a display is the size.How can we utilise the size of a display effectively when it is constantly getting bigger. Smart Mat A mat at the entrance of home, provides a vital connection between inside and outside the house.By sensing the body weight and footprint of the user, the smart mat immediately recognises which user isstepping on the mat. Pervasive Computing in Healthcare Pervasive computing is often mentioned in the context of improving healthcare.Usually, these exam- ples involve consumer monitoring devices such as bloodpressure cuffs and glucose meters that can upload data to a personal computer for collection and dissemination to professional caregivers.By collecting patient data in settings more varied than doctors’offices, healthcare provider shope to better understand themany facets of pa- tients’ daily gives and then modify the rapies to the individual.Another important context is emergency care to accelerate access to medical records at the emergency site or to bring experts to the scene virtually. By giving medical professionals appropriate,complete information,we expect to deliver better care that’s tuned not only to the situation but also to the patient’s history.The surgical field also receives much attention,as surgeons and nurses must monitor and controlvarious vital functions under intensely stressful conditions. Technologists are developing systemsto collect and process an ever-increasing range of telemetry from instruments used in an operating room and to augment human ability to detect patterns of concern that could require immediate action. A promising future Many of these applications have appeared in the popular press and are actually starting to be dep- loyed.At one end of the spectrum, consumer devices easily network with home PCs to let users gather data from sensors in the home that their physicians can access online. At the other end, telesurgery is becoming a practical reality, with remote physicians able to consult on a patient’s conditionas well as take part in a surgical proce- dure.This special issue seeks to go beyond these“expected” applications and bring the reader an even wider range of applicability for pervasivecomputing technologies in the highly variedhealthcare domain.Proponents tout pervasive computing as benefiting healthcare in at least three ways:
  • 6. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 91 | Page 1. Lowering costs by getting appropriate care tothe people who need it much faster than previously possible; 2. Making expert care accessible to more people, there by increasing the scale at which first-rate healthcare is applied; 3. Making healthcare more personalized, prompting individuals to take more responsibility for maintaining their health. IV. Security Challenges In Pervasive Computing Environment Pervasive computing environment or PCE share most of the security issues of traditional networked applications. These include authentication of devices and users, privacy of data or information, defense against malicious code such as viruses, worms, Trojan horses etc, and access control mechanisms. However, the perva- sive computing environment adds some unique issues to the already complex security arena. Physical security is important as the devices can be easily misplaced or stolen. Information that is usually confined behind a corpo- rate firewall is now winging its way through the air, possibly spending some time on hosted servers or wireless gateways. V. Security issues Many attempts have been made to apply traditional security concepts and solutions to pervasive plat- forms. However, in most cases, a lot of modifications are needed inorder for the security infrastructure to fit within the pervasive framework leading to a high level of risk of introducing new breaches. A generic security framework is needed [5]. One way to minimise the security issues with pervasive computing frameworks is to identify them in the early stages of their development. These issues include: 5.1 Reliability Pervasive systems expose a larger attack surface with many points of failure in comparison to tradi- tional computing environments [2]. If people depend upon pervasive systems to mediate day-to-day activities, such systems will quickly become missioncritical.They need to be robust, dependable, and always available. This is a very difficult problem for a pervasive computing framework to address. Due to the wide variety of computing technologies that entities will use, the risk of introducing security issues that may threaten the relia- bility of services will increase. 5.2 Trust The infrastructure that supports a pervasive computing system introduces new security challenges not addressed in existing security models, including in the domain of trust management [6, 7]. The issue of trust will
  • 7. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 92 | Page arise when anentity, such as a PDA, mobile phone or laptop computer that is unknown to otherentities offers services. Entities offering services may have an established connection history and are trusted. An entity con- necting to a pervasive environment for the first time will have no historical records on which to base a measure of trust. Such an entity may act maliciously and try to disrupt services being offered or it may be genuinely try- ing to avail of a specific service. The question of trust arises and whether existing members of the environment trust the intentions of this new entity. For example, two new entities (A and B) that are connected to the perva- sive environment may wish exchange data. Do they trust each other? to traditional computing environments [2]. If people depend upon pervasive systems to mediate day-to-day activities, such systems will quickly become mission critical.They need to be robust, dependable, and always available. This is a very difficult problem for a pervasive computing framework to address. Due to the wide variety of computing technologies that entities will use, the risk of introducing security issues that may threaten the reliability of services will increase. 5.3 Malicious attacks A common form of malicious attack is a Denial of Service (DoS) attack. A DoS is anattack with the purpose of preventing legitimate users from using a specfied network resource such as a website, web service, or computer system [9]. A Distributed Denialof Service (DDoS) attack is a coordinated attack on the availability of services ofa given target system or network that is launched indirectly through many compromised computing systems [10]. The threat of a deliberate attack by an entity connectedto a pervasive computing framework will exist. Any entity can act maliciouslyand may deliberately try to access a service provided by another entity that it is not permitted. A DoS attack can not only cause the innocent entity to malfunction but may also introduce other problems such as severe network latency, scalability problems when other entities try to connect to the framework and service unavailability. 5.4 Information propagation When data is transmitted between entities, it is possible that it may be altered or corrupted accidentally or maliciously. It is important that the integrity of the data in apervasive environment is maintained. If the data is altered, the entities may not have any mechanism to detect this. 5.5 Recourse Ranganathan states that because pervasive systems will mediate everyday physicalactivity, technical mechanisms to facilitate recourse must be built-in from the start[2]. When one entity provides a service to another, the problem exists when one of the entities reneges before a successful termination. A pervasive com- puting frameworkshould have mechanisms to deal with this.In the next section we introduce an example of a pervasive computing framework called ConStruct. We use this to motivate discussion ofhow security issues impact services that are supported in a pervasive environment. 5.6 Data Communication Privacy of the data encompasses two aspects. First, it hasto ensure that data being shared or communi- cated is not being hacked by any active or passive attackers. As aninitial thought, we consider several encryption and decryption techniques. But at the same time we need to think about the other side of the coin which reminds us about the memory, battery power and other limitations.Along with that, the users in pervasive computing environment have much more elasticity and sovereignty in mobility. This includes a large variety of domains ranging from well protected environments to totally open unprotected situations which makes the data protect its issue worse. Secondly, how can it be guaranteed that theuser data which is being collected almost obviously willnot be used maliciously? Or how we can ensure with certainty that the complicated data is not being proces- sedby any unauthorized user 5.7 Trust In order to overcome several constraints, mutualcooperation, interconnectedness and inter dependabilityhave been exposed as the obvious uniqueness of pervasivecomputing environment. Along with these occurs theissue of trust. If data is shared with an unwarranted device, the probability of data security reduces automatically. [8]. VI. Conclusions In this Paper we have gathered the information about the pervasive computing technologies, architec- ture, applications, issues and challenges we have seen, today the pervasive/ubiquitous computing is a fertile source of challenging problems in computer systems. In future we focus our research for creating applications such as smart home or office or university etc.without any technical challenges by using the advanced embedded systems or by efficient soft computing techniques.devices need to be perceived as portals into the applica- tion/data space supported by the environment, rather than repositories of custom software. Applications need to
  • 8. Pervasive Computing Applications And Its Security Issues & Challenges DOI: 10.9790/0661-17328693 www.iosrjournals.org 93 | Page be seen as tasks performed on behalf of a user, not as programs written to exploit the resources of a specific computer. The goal of a pervasive computing framework is to support services offered by entities in a heteroge- neous environment. It is highly probable that most entities havelittle or no knowledge of other entities and the services they offer. This introduces important security issues especially when a new entity makes available a new servicefor the first time.As a result of this 'unknown' factor introduced in this environment, there is astrong expectation for a pervasive computing framework to provide adequate security to all entities. The framework is transparent to these entities and as such they appear to communicate peer-to-peer. Unless entities are aware of appropriate security mechanisms, there may be reluctance for these to connect to the framework and avail of services in offer. References [1]. http://en.wikipedia.org/wiki/Pervasive_Computing [2]. Lathies Bhasker T “Pervasive Computing Issues, Challenges andApplications”International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 2 Issue 12, Dec.2013. [3]. “Security Issues with Pervasive Computing Frameworks” Michael CollinsSystems Research Group, School of Computer Science and Informatics,UCD Dublin, Ireand. [4]. ”Issues and challenges in ubiqutious computing” Protocol Engineering & Technology (PET) Lab. Indian Institute of Science,Bangalore. [5]. https://www.google.co.in/search?q=pervasive+compuing+characteristics&biw. [6]. A Survey on Pervasive Computing Er. Manita Gorai, Er. Kamna Agarwal , International Journal of Scientific & Engineering Re- search Volume 3, Issue 6, June-2012 [7]. M. Satyanarayanan: Pervasive Computing: Vision and Challenges. IEEE Personel Communications, 2001