Dissecting the Security and Protection Issues in Pervasive Computing

  • Qaisar Javaid Department of Computer Science and Software Engineering, International Islamic University, Islamabad
  • Humera Yasmeen Department of Computer Science, COMSATS Institute of Information Technology, Islamabad.
  • Munam Ali Shah Department of Computer Science, COMSATS Institute of Information Technology, Islamabad
  • Muhammad Kamran Department of Distance Continuing and Computer Education, University of Sindh, Jamshoro
  • Adnan Sohail Department of Computer Science, Iqra University, Islamabad


Human beings reflect nomadic behaviour as they keep on travelling place to place whole day for personal or organizational purposes. The inception of modern networking technologies and the advent of wide range of applications in terms of services and resources have facilitated the users in many ways. The advancements in numerous areas such as embedded systems, WN (Wireless Networks), mobile and context-aware computing, anticipated pervasive computing dominated the human communication at large. Pervasive computing refers to the environment where information is accessible anywhere and anytime while existing system is invisible to the user. On the other hand, the invisibility of pervasive computing is also a problem in its adoption as users are unaware when and what devices collect their personal data and how it is being used. It has caused new security chaos as the more information about user is collected the more privacy and security concerns it raises, thus, the pervasive computing applications became key concern for user. This paper is aimed at analyzing the security and protection issues that arise while traveling from place to place connected with wireless mobile networks. The paper reviews many existing systems that offer possible security to pervasive users. An easy, precise and relative analysis and evaluation of surveyed pervasive systems are presented and some future directions are highlighted.

Apr 1, 2018
How to Cite
JAVAID, Qaisar et al. Dissecting the Security and Protection Issues in Pervasive Computing. Mehran University Research Journal of Engineering and Technology, [S.l.], v. 37, n. 2, p. 241-256, apr. 2018. ISSN 2413-7219. Available at: <http://publications.muet.edu.pk/index.php/muetrj/article/view/195>. Date accessed: 15 july 2018. doi: http://dx.doi.org/10.22581/muet1982.1802.02.
This is an open Access Article published by Mehran University of Engineering and Technolgy, Jamshoro under CCBY 4.0 International License