سال انتشار: ۱۳۹۰
محل انتشار: اولین کنفرانس ملی دانش پژوهان کامپیوتر و فناوری اطلاعات
تعداد صفحات: ۶
maryam saleh mohammadzad – University of Tabriz, Master Student of Computer Science
leila mohammad khanli – University of Tabriz, Department of Computer Science
ayaz isazadeh – University of Tabriz, Department of Computer Science
The purpose of pervasive computing is anywhere and anytime access to information within computing infrastructures. Pervasive computing poses new security challenges while the information is reachable at anywhereand anytime and it may be applied by malicious users. Additionally, in some special environments such as a military domicile exchanged data between devices may contain private information that cannot be shared by all user communities. Several approaches are developed to protect information for pervasive environments against strangers. As Hardware based security solutions in most fields of technology can offer greater assurance, in this paper, we present a hardware based security usage in pervasive computing environments, which provides more security in comparison with software program based encryptions. The model not only make appropriate decisions about nodes access rights, but also provides trustworthiness security for pervasive computing and protects the information from software based attacks. Finally, the security degree of the model is analyzed.