JOURNAL ARTICLE

Efficient Security Model for Pervasive Computing Using Multi-Layer Neural Network

Jayashree AgarkhedGeetha Pawar

Year: 2021 Journal:   2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT) Pages: 1-6

Abstract

In new technological world pervasive computing plays the important role in data computing and communication. The pervasive computing provides the mobile environment for decentralized computational services at anywhere, anytime at any context and location. Pervasive computing is flexible and makes portable devices and computing surrounded us as part of our daily life. Devices like Laptop, Smartphones, PDAs, and any other portable devices can constitute the pervasive environment. These devices in pervasive environments are worldwide and can receive various communications including audio visual services. The users and the system in this pervasive environment face the challenges of user trust, data privacy and user and device node identity. To give the feasible determination for these challenges. This paper aims to propose a dynamic learning in pervasive computing environment refer the challenges proposed efficient security model (ESM) for trustworthy and untrustworthy attackers. ESM model also compared with existing generic models; it also provides better accuracy rate than existing models.

Keywords:
Ubiquitous computing Computer science Context-aware pervasive systems Laptop Mobile device Mobile computing End-user computing Context (archaeology) Node (physics) Computer security Utility computing Computer network Distributed computing Human–computer interaction Cloud computing World Wide Web Cloud computing security Operating system

Metrics

1
Cited By
0.31
FWCI (Field Weighted Citation Impact)
23
Refs
0.38
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

IoT and Edge/Fog Computing
Physical Sciences →  Computer Science →  Computer Networks and Communications
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Network security using multi-layer neural network

P. VijayakumarC. A. Sathiya MoorthyMakarand UpadhyayaPankaj DadheechT. YuvarajPravin R. Kshirsagar

Journal:   AIP conference proceedings Year: 2022 Vol: 2393 Pages: 020089-020089
BOOK-CHAPTER

Pervasive Computing Security

Giorgos KostopoulosParis KitsosOdysseas Koufopavlou

Wireless networks and mobile communications Year: 2008 Pages: 257-286
JOURNAL ARTICLE

Partitioning multi-layer edge network for neural network collaborative computing

Qiang LiMing‐Tuo ZhouTian-Feng RenCheng-Bin JiangYong Chen

Journal:   EURASIP Journal on Wireless Communications and Networking Year: 2023 Vol: 2023 (1)
BOOK-CHAPTER

Pervasive Computing Security

Year: 2020 Pages: 1071-1071
JOURNAL ARTICLE

Enhanced Security Model for Pervasive Computing Using Machine Learning Techniques

Jayashree AgarkhedGeetha Pawar

Journal:   Atlantis Highlights in Computer Sciences/Atlantis highlights in computer sciences Year: 2021
© 2026 ScienceGate Book Chapters — All rights reserved.