International Journal of Information Technology & Computer Science ( www.ijitcs.com ) Volume 15 Issue No 1, June 2014
ISSN ( online ) : 2091-1610
This paper was presented @International Conference on Future Computing & Communication System ( ICFCCS 2014 ) ( www.icfccs.com ) –
Dubai, UAE on May 11-12, 2014 : Copyright © International Journal of Information Technology & Computer Science ( IJITCS ) .
37
Anonymity Handling and Sensor Object Modeling for Pervasive Environments using
VISA Processing
Dr.G.Radhamani
School of IT and Science, Dr.GRD College of Science, Coimbatore, India
radhamani@grd.edu.in
K.Vanitha
School of IT and Science, Dr.GRD College of Science, Coimbatore, India
vanitha.k@grd.edu.in
Angela Amphawan
Research Laboratory of Electronics
Electrical Engineering and Computer Science Department
Massachusetts Institute of Technology, 02139 Cambridge, USA
angelaa@mit.edu
Abstract:
Pervasive computing devices are configured for anywhere at any time services to adapt the changes in the dynamic
environment with respect to the user mobility. The paper proposes a salient model for a log based anonymity handling
in pervasive networks. The model defines a resource registry and sensor object modeling. Associability between the
nodes are configured with an allied user interface in the environment. Resource registry refers to a record of
information about the sensor nodes. A log book is maintained to keep track of the service discovery issues. New device
enquiry, registration and adaption are major issues in such pervasive devices. These issues lead to unacknowledged
communication that causes anonymity. This paper defines and discusses the presence of anonymity in pervasive
environments due to aforementioned issues.
Keywords- : Pervasive Computing; Service Discovery; Anonymity; Middleware.
I. INTRODUCTION
Personal computing is expanded to pervasive computing when the user interaction increases to many devices
or computers. Pervasive computing provides an attractive vision for accessing information anywhere and anytime.
Such environments gracefully integrate networked computing devices from tiny sensors to extremely dynamic and
powerful devices with people and their ambient environments. A room, for example, might be saturated with hundreds
of devices that provide information to people without seeking their active attention. Pervasive computing is the idea
that almost any type of device can be embedded with chips to connect the device to an infinite network of other devices
to provide convenient access to relevant information when and where it is needed. With respect to the development
of applications for pervasive environments, a middleware can be used to bridge the gap between the application and
the underlying operating systems and networks. One of the basic purposes of any middleware is to satisfy application
requirements as well as to support the challenges and issues in computing devices. Dynamic changes of the
environment reflect in the mobility and location change of the user or the device, data transfer between sensor nodes