Efficient Security Model for Pervasive Computing Using Multi-Layer Neural Network
Title | Efficient Security Model for Pervasive Computing Using Multi-Layer Neural Network |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Agarkhed, Jayashree, Pawar, Geetha |
Conference Name | 2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT) |
Keywords | artificial intelligence, Computational modeling, Data models, efficient security model, human factors, machine learning, Metrics, Pervasive computing, Pervasive Computing Security, Portable computers, pubcrawl, resilience, Resiliency, Scalability, Training, ubiquitous computing, ubiquitous computing(ubicomp), user experience, visualization |
Abstract | In new technological world pervasive computing plays the important role in data computing and communication. The pervasive computing provides the mobile environment for decentralized computational services at anywhere, anytime at any context and location. Pervasive computing is flexible and makes portable devices and computing surrounded us as part of our daily life. Devices like Laptop, Smartphones, PDAs, and any other portable devices can constitute the pervasive environment. These devices in pervasive environments are worldwide and can receive various communications including audio visual services. The users and the system in this pervasive environment face the challenges of user trust, data privacy and user and device node identity. To give the feasible determination for these challenges. This paper aims to propose a dynamic learning in pervasive computing environment refer the challenges proposed efficient security model (ESM) for trustworthy and untrustworthy attackers. ESM model also compared with existing generic models; it also provides better accuracy rate than existing models. |
DOI | 10.1109/ICECCT52121.2021.9616968 |
Citation Key | agarkhed_efficient_2021 |
- Portable computers
- visualization
- user experience
- ubiquitous computing(ubicomp)
- ubiquitous computing
- Training
- Scalability
- Resiliency
- resilience
- pubcrawl
- Pervasive Computing Security
- pervasive computing
- Metrics
- machine learning
- Human Factors
- efficient security model
- Data models
- Computational modeling
- Artificial Intelligence