International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 119 | Views: 255 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.9 / 10


     

Survey Paper on Pervasive Computing for Mobile Security

Kulashree Joshi, Sulochana Sonkamble


Abstract: Now a day, many applications rely on the existence of small devices that can exchange information and form communication networks. And it is very challenging to provide security for such application. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages based on Advance Encryption crypto graphic System that are directed to meet the requirements of mobile and pervasive applications. The encryption technique have the chance of the data misusing hence we add the password based authentication technique. By using Advance Encryption algorithm we are authenticating the message which is encrypted and we are improving the decryption speed and authentication accuracy to secure the communication the proposed message authentication technique is more efficient than the previous MAC algorithms and the aim of this proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives. It provides the security to the data. However it has high risk to the sender input data while the transmission to the receiver. The process will be evaluated in the real time scenario in terms of the networking environment. The performance will be evaluated in terms of the time complexity of the whole process.


Keywords: gadgets, authentication code, communication systems, encrypt-and-authenticate, pervasive computing


Edition: Volume 4 Issue 1, January 2015


Pages: 1065 - 1068



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Kulashree Joshi, Sulochana Sonkamble, "Survey Paper on Pervasive Computing for Mobile Security", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 1065-1068, https://www.ijsr.net/getabstract.php?paperid=SUB15308



Similar Articles

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 11 Issue 3, March 2022

Pages: 546 - 548

A Click Away One Stop Solution for All the Art Enthusiastic People

Jaymin Lotiya, Sumeet Kumar, Vinayak Sahani, Avnish Yadav, Utpal Patel

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 9, September 2023

Pages: 1140 - 1149

Review: A Concise Review on Internet of Things (IoT) and Future Technologies

Ojasvi Savlani, Mohit Sood

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 9, September 2023

Pages: 1038 - 1044

Cloud Computing - A Market Perspective and Research Directions

Damiya Chatha, Raghu Raja Mehra

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 9, September 2023

Pages: 1263 - 1266

Neuralink: Spearheading the Point of Interaction among Brain and Machine

Ahdil Singh, Vikas Kumar

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article



Top