Study on Security and Privacy Approaches on Pervasive Computing Environment

Exploring Security and Privacy Approaches in Pervasive Computing Environments

Authors

  • Bhawna Kaushik
  • Dr. Ali Akbar Babalal Bagwan

Keywords:

security, privacy, pervasive computing, mobile ad hoc networks, distributed systems, shopping centers, gathering scenes, smart offices, devices, environments

Abstract

It is not necessarily the case that all components in this conveyed situation should be portable—just that no specific arrangement of gadgetsPCs is accessible to frame the steady center of an appropriated framework consistently. For example, in environments like shopping centers, gathering scenes, or shrewd workplaces, a few gadgets (e.g., work areasworkstations, IP telephones, retail location terminals, projectors, espresso machines) are static while different gadgets (PDAs, handhelds, and so forth) are versatile. In the limit case, Pervasive Computing environments incorporate MANETs (Mobile Ad hoc Networks), where all hubs are versatile and progressively change their areas. Instances of such environments can be found in the cell phones utilized by crisis reaction administrations, by officers in combat zones, by individuals strolling on roads, and so forth.

Downloads

Published

2020-04-01

How to Cite

[1]
“Study on Security and Privacy Approaches on Pervasive Computing Environment: Exploring Security and Privacy Approaches in Pervasive Computing Environments”, JASRAE, vol. 17, no. 1, pp. 363–370, Apr. 2020, Accessed: Sep. 20, 2024. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/12639

How to Cite

[1]
“Study on Security and Privacy Approaches on Pervasive Computing Environment: Exploring Security and Privacy Approaches in Pervasive Computing Environments”, JASRAE, vol. 17, no. 1, pp. 363–370, Apr. 2020, Accessed: Sep. 20, 2024. [Online]. Available: https://ignited.in/index.php/jasrae/article/view/12639