Study on Security and Privacy Approaches on Pervasive Computing Environment
Exploring Security and Privacy Approaches in Pervasive Computing Environments
Keywords:
security, privacy, pervasive computing, mobile ad hoc networks, distributed systems, shopping centers, gathering scenes, smart offices, devices, environmentsAbstract
It is not necessarily the case that all components in this conveyed situation should be portable—just that no specific arrangement of gadgetsPCs is accessible to frame the steady center of an appropriated framework consistently. For example, in environments like shopping centers, gathering scenes, or shrewd workplaces, a few gadgets (e.g., work areasworkstations, IP telephones, retail location terminals, projectors, espresso machines) are static while different gadgets (PDAs, handhelds, and so forth) are versatile. In the limit case, Pervasive Computing environments incorporate MANETs (Mobile Ad hoc Networks), where all hubs are versatile and progressively change their areas. Instances of such environments can be found in the cell phones utilized by crisis reaction administrations, by officers in combat zones, by individuals strolling on roads, and so forth.Published
2020-04-01
How to Cite
[1]
“Study on Security and Privacy Approaches on Pervasive Computing Environment: Exploring Security and Privacy Approaches in Pervasive Computing Environments”, JASRAE, vol. 17, no. 1, pp. 363–370, Apr. 2020, Accessed: Sep. 20, 2024. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/12639
Issue
Section
Articles
How to Cite
[1]
“Study on Security and Privacy Approaches on Pervasive Computing Environment: Exploring Security and Privacy Approaches in Pervasive Computing Environments”, JASRAE, vol. 17, no. 1, pp. 363–370, Apr. 2020, Accessed: Sep. 20, 2024. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/12639