SECURITY THROUGH ADHOC NETWORK FOR UBIQUITIONS TECHNOLOGIES IN COMPUTING

Kailash Aseri

Abstract


This paper examines security through adhoc network for ubiquitions technologies in computing. The meaning of specially appointed systems and its applications, also the paper plunges somewhat more profound into how directing is dealt with in adhoc networks and depicts Security through ADHOC Network for UBIQUITIONS Technologies in Computing and several diverse routing techniques. The paper examines routing strategies from two alternate points of view position based and versatile in each of these two classes it portrays a few unique techniques in more detail. At long last the paper quickly talks about security issues identified with routing conventions this is planned to give the per user a look of which security issues emerges in the outline of specially appointed systems.


Full Text:

PDF

References


Jaydip Sen(2010), Ubiquitous Computing: Potentials and Challenges, Proceedings of the International Conference on Trends & Advances in Computation & Engineering (TRACE), 25-26 February 2010

P.A. Wagner, L.M. Hilty, P. Arnfalk, L. Erdmann, J. Goodman (2006), “Experience with a System Dynamics Model in a Prospective Study on the Future Impact of ICT on Environmental Sustainability,” In Proceedings of the iEMSs 3rd Biennial Meeting “Summit on Environmental Modeling and Software,” International Environmental Modeling and Software Society, Burlington, USA, July 2006.

Chalasani, S., Conrad, J., 2008. A survey of energy harvesting sources for embedded systems. In: Proceedings of IEEE, Southeastcon 2008, Huntsville, AL, 3–6 April 2008. New York, pp. 442–447.

Lagasse, P., Moermann, I., 2005. Broadband communication. In: Aarts, E., Encarnaçao, J.L. (Eds.), True Visions: The Emergence of Ambient Intelligence. Springer, Berlin, Heidelberg, pp. 185–207.

Wasinger, R., Wahlster, W., 2005. Multi-modal human–environment interaction. In: Aarts, E., Encarnaçao, J.L. (Eds.), True Visions: The Emergence of Ambient Intelligence. Springer, Berlin, Heidelberg, pp. 291–306

Garfinkel, S., Holtzman, H., 2006. Understanding RFID technology. In: Garfinkel, Rosenberg, pp. 15–36.

Garfinkel, S., Rosenberg, B., 2006. RFID – Applications, Security, and Privacy. Addison-Wesley, Upper Saddle River, NJ.

Want, R., 2006. An introduction to RFID technology. IEEE Pervasive Computing 5 (1), 25–33

Erdmann, L., Hilty, L., Althaus, H.-J., Behrendt, S., Hischier, R., Kamburow, C., Oertel, B., Wäger, P., Welz, T., 2009. Einfluss von RFID-Tags auf die Abfallentsorgung: Prognose möglicher Auswirkungen eines massenhaften Einsatzes von RFID-Tags im Konsumgüterbereich auf die Umwelt und die Abfallentsorgung. Texte 27/2009, German Federal Environemtal Agency, Dessau-Roßlau (in German). Available from: .

Juels, A., 2007. The vision of secure RFID. Proceedings of the IEEE 95 (8), 1507–1508.

Moore, G.. (1965): Cramming more components onto integrated circuits. Electronics, Vol. 38, pp. 114- 117




DOI: https://doi.org/10.23956/ijarcsse.v8i8.693

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.