Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE
Section 6.1 A VISION OF A PERSONAL NETWORK
6.1 A VISION OF A PERSONAL NETWORK
6.1 A VISION OF A PERSONAL NETWORK(PN) Application may run locally or remotely, but the service is end-to-end. A PN may not be needed to run an application, but it is always needed to support personal services.
Section 6.2 SOME EXAMPLE SCENARIOS
6.2.1 Health
Based on these figures, it can be seen that diabetes requires low-data-rate (LDR) communication. Depending on the combination of sensors. Actual data rates would be somewhat higher given the protocol overhead.
6.2.2 Home and Daily Life The use of nomadic PANs is not limited to homes in this context; it may readily be extended to vehicles and other homes away from home. There is a lot of efficiency to be gained from collecting context data and linking this to personal data available through networks. Adding presence information to the digital life recorded and categorizing certain context groupings can also yield interesting efficiency gains.
6.2.3 Distributed Work Distributed work is typified by cooperation between multiple individuals working toward a common goal. Examples of distributed work scenarios include: † Journalists and mass media covering a story † Students working on a common project † Researchers in cooperating projects Collaborations may also extend beyond personal networks to what may be referred to as federated networks.
Section 6.3 SYSTEM AND REQUIREMENTS
6.3 SYSTEM AND REQUIREMENTS The functional requirements for wireless communication in the P-PAN may be summarized as follows: Short range Low power Low cost Good coexistence Robust, simple-to-use, and reliable devices Small, highly portable, and efficient Go-anywhere operation Secure and trusted
6.3 SYSTEM AND REQUIREMENTS
Section 6.4 USER REQUIREMENTS AND SCENARIOS
6.4 USER REQUIREMENTS AND SCENARIOS High-level security requirements for the PN infrastructure must be defined for both entities: Individual (unknown) ad hoc PN user. An existing PAN or PN (or group of them) configuration capable of providing connection to any user type requesting services.
Section 6.5 NETWORK ARCHITECTURE
6.5 NETWORK ARCHITECTURE Key issues with respect to Secure PNs include integration into: 1. Heterogeneous networks, 2. Addressing, 3. PN protocols (e.g., secure remote service discovery), 4. Mobility, 5. Handover
Section 6.6 ACCESS AND ACCESS CONTROL TECHNIQUES
6.6 ACCESS AND ACCESS CONTROL TECHNIQUES The (Air Interface) AI solutions can be divided into two broad categories: 1. Low-complexity PHYMAC solutions for simple, 2. High-performance solutions for high-data-rate (HDR) applications. Frequency Modulation UWB (FM-UWB) Multicarrier Spread Spectrum (MC-SS)
Section 6.7 SECURITY
6.7 SECURITY Security for LDR devices (e.g., sensors) typically consists of five components: Sensing hardware, Memory, Battery, Embedded processor, Transceiver Provide security in LDR environments based on service-aware adaptive security architecture.
Section 6.8 DEVICES AND SERVICE PLATFORMS
6.8 DEVICES AND SERVICE PLATFORMS More capable gateway devices would support the PAN air interfaces along with one or more legacy technologies to connect to the core network. By password protection and smart card technology. It is not enough to create a secure end-to-end PN from one person or device to another.
Section 6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES
6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES More capable gateway devices would support the PAN air interfaces along with one or more legacy technologies to connect to the core network: 1. Home area networks (HANs) 2. Vehicular area networks (VANs) 3. Enterprise networks (ENs) 4. Wireless sensor networks (WSNs)
6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES The operator network enables wide-area connectivity to interconnect the various personal domains that may be geographically distributed. Such connections may be layer 2 or network-layer tunnels to ensure security in addition to device- and application-level security under the control of the user ’ s own network domains
Section 6.10 TOWARD PERSONAL SERVICES OVER PERSONAL NETWORKS
6.10 TOWARD PERSONAL SERVICES OVER PERSONAL NETWORKS Need to build more than the networks, devices, and applications. Need to build the business and establish trust
Section 6.11 CONCLUSIONS
6.11 CONCLUSIONS Described how a home network can evolve into a secured virtual home network. Defined such a network as a personal network (PN). Developed a number of data exchange requirements, functional requirements, and overall system requirements for PNs and personal PANs.