Dissecting the Security and Protection Issues in Pervasive Computing

Abstract

Human beings reflect nomadic behaviour as they keep on travelling place to place whole day for personal or organizational purposes. The inception of modern networking technologies and the advent of wide range of applications in terms of services and resources have facilitated the users in many ways. The advancements in numerous areas such as embedded systems, WN (Wireless Networks), mobile and context-aware computing, anticipated pervasive computing dominated the human communication at large. Pervasive computing refers to the environment where information is accessible anywhere and anytime while existing system is invisible to the user. On the other hand, the invisibility of pervasive computing is also a problem in its adoption as users are unaware when and what devices collect their personal data and how it is being used. It has caused new security chaos as the more information about user is collected the more privacy and security concerns it raises, thus, the pervasive computing applications became key concern for user. This paper is aimed at analyzing the security and protection issues that arise while traveling from place to place connected with wireless mobile networks. The paper reviews many existing systems that offer possible security to pervasive users. An easy, precise and relative analysis and evaluation of surveyed pervasive systems are presented and some future directions are highlighted.

Authors and Affiliations

Javaid Qaisar, Humera Yasmeen, Munam Ali Shah, Muhammad Kamran, Adnan Sohail

Keywords

Related Articles

Effectiveness and Future Prospects of Telemedicine/Remote Health Care Management Applications in Pakistan

Medical/Health care system is spraining in Pakistan because of innovative technology, activities and services as per their financial cost (position) which is increasing day by day. This research is intended for the asses...

Calibration and Validation of an Experimental Setup for the Measurement of the Cylindrical Body Shapes and Curvatures of the Objects and Subjects through the Techniques of Rasterstereography

The intent of study is to establish a criterion for the experimental setup of rasterstereography, one that is more efficient, simple, accurate and precise to examine and analyse the curvature of the object or the subject...

Review of Electrical Motor Drives for Electric Vehicle Applications

EVs (Electric Vehicles) have been rejuvenated over the last decades while the motor drive technologies are still evolving. This paper provides a review of electrical motor drive technologies used in EV applications, with...

Application of Lean Agile Resilient Green Paradigm Framework on China Pakistan Economic Corridor: A Case Study

China has recently emerged as the technological and economic giant and an attractive place for investment for MCNs (Multi-National Companies). Many of the high ranked MNC?s have shifted their production facilities to Chi...

Adaptive HAR System to Improve Recognition Accuracy

HAR (Human Activity Recognition) system becomes complex, inefficient and less accurate as we keep on adding new activities into the system; because it follows a specific procedure for activity recognition, from raw data...

Download PDF file
  • EP ID EP269103
  • DOI 10.22581/muet1982.1802.02
  • Views 110
  • Downloads 0

How To Cite

Javaid Qaisar, Humera Yasmeen, Munam Ali Shah, Muhammad Kamran, Adnan Sohail (2018). Dissecting the Security and Protection Issues in Pervasive Computing. Mehran University Research Journal of Engineering and Technology, 37(2), 241-266. https://europub.co.uk./articles/-A-269103