Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015
Survey Paper on Pervasive Computing for Mobile Security
Kulashree Joshi, Sulochana Sonkamble
Abstract: Now a day, many applications rely on the existence of small devices that can exchange information and form communication networks. And it is very challenging to provide security for such application. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages based on Advance Encryption crypto graphic System that are directed to meet the requirements of mobile and pervasive applications. The encryption technique have the chance of the data misusing hence we add the password based authentication technique. By using Advance Encryption algorithm we are authenticating the message which is encrypted and we are improving the decryption speed and authentication accuracy to secure the communication the proposed message authentication technique is more efficient than the previous MAC algorithms and the aim of this proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives. It provides the security to the data. However it has high risk to the sender input data while the transmission to the receiver. The process will be evaluated in the real time scenario in terms of the networking environment. The performance will be evaluated in terms of the time complexity of the whole process.
Keywords: gadgets, authentication code, communication systems, encrypt-and-authenticate, pervasive computing
Edition: Volume 4 Issue 1, January 2015,
Pages: 1065 - 1068
How to Cite this Article?
Kulashree Joshi, Sulochana Sonkamble, "Survey Paper on Pervasive Computing for Mobile Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB15308, Volume 4 Issue 1, January 2015, 1065 - 1068
How to Share this Article?
Similar Articles with Keyword 'gadgets'
Simulation Study of VANET Routing Protocols on NS-2 and NS-3
Dipti Shastri, Ajay Lala
A Video Forgery Detection Using Discrete Wavelet Transform and Scale Invarient Feature Transform Techniques
Gurjinder Kaur, Rishamjot Kaur
Similar Articles with Keyword 'authentication code'
Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Security for Android Mobile Phones using Biometric Authentication against Factory Reset
Suchita Rane, Dr. Narendra Shekokar
Similar Articles with Keyword 'communication systems'
Scalable Uninterrupted Network Service Using LTE
S. Kalaiyarasi, M. Manikandan
Medical Information Retrieval in Mobile Devices
Bibek Raj Dhakal, Prof. Dr. A. Damodaram
Similar Articles with Keyword 'pervasive computing'
Pervasive Monitoring of M-Health Care Using Android
Nitin R Kulkarni, Dr. Sujata Terdal
Mobile Phone Sensing System for Health Monitoring
Snehal D. Nanhore, Mahip M. Bartere