![Page 1: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/1.jpg)
Chapter 6
SECURE WIRELESS PERSONALNETWORKS: HOME EXTENDED
TO ANYWHERE
![Page 2: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/2.jpg)
Section 6.1
A VISION OF A PERSONAL NETWORK
![Page 3: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/3.jpg)
![Page 4: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/4.jpg)
6.1 A VISION OF A PERSONAL NETWORK
![Page 5: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/5.jpg)
6.1 A VISION OF A PERSONAL NETWORK(PN) Application may run locally or remotely, but the se
rvice is end-to-end.
A PN may not be needed to run an application, but it is always needed to support personal services.
![Page 6: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/6.jpg)
Section 6.2
SOME EXAMPLE SCENARIOS
![Page 7: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/7.jpg)
6.2.1 Health
![Page 8: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/8.jpg)
6.2.1 Health Based on these figures, it can be seen that diabete
s requires low-data-rate (LDR) communication.
Depending on the combination of sensors. Actual data rates would be somewhat higher given the protocol overhead.
![Page 9: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/9.jpg)
6.2.2 Home and Daily Life The use of nomadic PANs is not limited to homes in this cont
ext; it may readily be extended to vehicles and other homes away from home.
There is a lot of efficiency to be gained from collecting context data and linking this to personal data available through networks.
Adding presence information to the digital life recorded and categorizing certain context groupings can also yield interesting efficiency gains.
![Page 10: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/10.jpg)
6.2.3 Distributed Work
Distributed work is typified by cooperation between multiple individuals working toward a common goal.
Examples of distributed work scenarios include:† Journalists and mass media covering a story† Students working on a common project† Researchers in cooperating projects
Collaborations may also extend beyond personal networks to what may be referred to as federated networks.
![Page 11: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/11.jpg)
Section 6.3
SYSTEM AND REQUIREMENTS
![Page 12: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/12.jpg)
6.3 SYSTEM AND REQUIREMENTS The functional requirements for wireless communicatio
n in the P-PAN may be summarized as follows:
Short range Low power Low cost Good coexistence Robust, simple-to-use, and reliable devices Small, highly portable, and efficient Go-anywhere operation Secure and trusted
![Page 13: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/13.jpg)
6.3 SYSTEM AND REQUIREMENTS
![Page 14: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/14.jpg)
Section 6.4
USER REQUIREMENTS AND SCENARIOS
![Page 15: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/15.jpg)
6.4 USER REQUIREMENTS AND SCENARIOS
High-level security requirements for the PN infrastructure must be defined for both entities:
Individual (unknown) ad hoc PN user.
An existing PAN or PN (or group of them) configuration capable of providing connection to any user type requesting services.
![Page 16: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/16.jpg)
Section 6.5
NETWORK ARCHITECTURE
![Page 17: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/17.jpg)
6.5 NETWORK ARCHITECTURE
Key issues with respect to Secure PNs include integration into:
1. Heterogeneous networks,2. Addressing, 3. PN protocols (e.g., secure remote service discover
y), 4. Mobility,5. Handover
![Page 18: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/18.jpg)
Section 6.6
ACCESS AND ACCESS CONTROL TECHNIQUES
![Page 19: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/19.jpg)
6.6 ACCESS AND ACCESS CONTROL TECHNIQUES
The (Air Interface) AI solutions can be divided into two broad categories:
1. Low-complexity PHYMAC solutions for simple,
2. High-performance solutions for high-data-rate (HDR) applications.
Frequency Modulation UWB (FM-UWB)
Multicarrier Spread Spectrum (MC-SS)
![Page 20: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/20.jpg)
Section 6.7
SECURITY
![Page 21: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/21.jpg)
6.7 SECURITYSecurity for LDR devices (e.g., sensors) typically consi
sts of five components: Sensing hardware, Memory, Battery, Embedded processor, Transceiver
Provide security in LDR environments based on service-aware adaptive security architecture.
![Page 22: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/22.jpg)
Section 6.8
DEVICES AND SERVICE PLATFORMS
![Page 23: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/23.jpg)
6.8 DEVICES AND SERVICE PLATFORMS
More capable gateway devices would support the PAN air interfaces along with one or more legacy technologies to connect to the core network.
By password protection and smart card technology.
It is not enough to create a secure end-to-end PN from one person or device to another.
![Page 24: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/24.jpg)
Section 6.9
SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES
![Page 25: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/25.jpg)
6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES
More capable gateway devices would support the PAN air interfaces along with one or more legacy technologies to connect to the core network:
1. Home area networks (HANs)2. Vehicular area networks (VANs)3. Enterprise networks (ENs)4. Wireless sensor networks (WSNs)
![Page 26: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/26.jpg)
6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES The operator network enables wide-area conn
ectivity to interconnect the various personal domains that may be geographically distributed.
Such connections may be layer 2 or network-layer tunnels to ensure security in addition to device- and application-level security under the control of the user’s own network domains
![Page 27: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/27.jpg)
Section 6.10
TOWARD PERSONAL SERVICES OVER PERSONAL NETWORKS
![Page 28: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/28.jpg)
6.10 TOWARD PERSONAL SERVICES OVER PERSONAL NETWORKS
Need to build more than the networks, devices, and applications.
Need to build the business and establish trust
![Page 29: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/29.jpg)
Section 6.11
CONCLUSIONS
![Page 30: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE](https://reader035.vdocument.in/reader035/viewer/2022062407/56649d545503460f94a317c6/html5/thumbnails/30.jpg)
6.11 CONCLUSIONS Described how a home network can evolve into a s
ecured virtual home network.
Defined such a network as a personal network (PN).
Developed a number of data exchange requirements, functional requirements, and overall system requirements for PNs and personal PANs.