International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015

Survey Paper on Pervasive Computing for Mobile Security

Kulashree Joshi, Sulochana Sonkamble

Now a day, many applications rely on the existence of small devices that can exchange information and form communication networks. And it is very challenging to provide security for such application. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages based on Advance Encryption crypto graphic System that are directed to meet the requirements of mobile and pervasive applications. The encryption technique have the chance of the data misusing hence we add the password based authentication technique. By using Advance Encryption algorithm we are authenticating the message which is encrypted and we are improving the decryption speed and authentication accuracy to secure the communication the proposed message authentication technique is more efficient than the previous MAC algorithms and the aim of this proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives. It provides the security to the data. However it has high risk to the sender input data while the transmission to the receiver. The process will be evaluated in the real time scenario in terms of the networking environment. The performance will be evaluated in terms of the time complexity of the whole process.

Keywords: gadgets, authentication code, communication systems, encrypt-and-authenticate, pervasive computing

Edition: Volume 4 Issue 1, January 2015

Pages: 1065 - 1068

Share this Article

How to Cite this Article?

Kulashree Joshi, Sulochana Sonkamble, "Survey Paper on Pervasive Computing for Mobile Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB15308, Volume 4 Issue 1, January 2015, 1065 - 1068

37 PDF Views | 34 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'gadgets'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2164 - 2167

A Review on Conversion of Image to Text As Well As Speech Using Edge Detection and Image Segmentation

Mrunmayee Patil, Ramesh Kagalkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1065 - 1068

Survey Paper on Pervasive Computing for Mobile Security

Kulashree Joshi, Sulochana Sonkamble

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1235 - 1239

Kerberos as a Service in Cloud Computing Security Issues

Y. Shashank Rao, Dr. N. Chandra Sekhar Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2258 - 2261

A Cloud-based Java Compiler

Sandeep Adhikari, Sagar Gurung, Amjad PP, Chitra M.P.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 339 - 343

Survey Paper on Location Privacy Preserving and Finding Optimal Meeting Location using Secured Homomorphism

Ritesh Thakur, Vilas Shelke

Share this Article

Similar Articles with Keyword 'authentication code'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 608 - 612

Security for Android Mobile Phones using Biometric Authentication against Factory Reset

Suchita Rane, Dr. Narendra Shekokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1065 - 1068

Survey Paper on Pervasive Computing for Mobile Security

Kulashree Joshi, Sulochana Sonkamble

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 379 - 381

A Novel Security Model For Password Stealing And Password Reuse Attacks

P.Kasthuri, R.Kokila

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1449 - 1453

Review on Message Authentication Protocol for Vehicular Ad Hoc Network

Sarika A. Velukar, Dr. M. S. Ali

Share this Article

Similar Articles with Keyword 'communication systems'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 968 - 971

Medical Information Retrieval in Mobile Devices

Bibek Raj Dhakal, Prof. Dr. A. Damodaram

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1065 - 1068

Survey Paper on Pervasive Computing for Mobile Security

Kulashree Joshi, Sulochana Sonkamble

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1449 - 1453

Review on Message Authentication Protocol for Vehicular Ad Hoc Network

Sarika A. Velukar, Dr. M. S. Ali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 252 - 255

Post Disaster Relief Operations Communication Using Grid Location Services in Smartphone

D. S. John Deva Prasanna, K. Rajarajan

Share this Article

Similar Articles with Keyword 'pervasive computing'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 887 - 890

Analysis of Image Classification and Annotation Methods for Smartphone

Lekhraj D. Vilhekar, Dr. M. B. Chandak

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1065 - 1068

Survey Paper on Pervasive Computing for Mobile Security

Kulashree Joshi, Sulochana Sonkamble

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 264 - 268

Vampire Attacks: Draining Life from Wireless Ad-hoc Sensor Networks

Trupti Pawar, Jyoti Patil

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 816 - 823

Pervasive Monitoring of M-Health Care Using Android

Nitin R Kulkarni, Dr. Sujata Terdal

Share this Article



Top