Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Slides:



Advertisements
Similar presentations
1 Mata Architecture for the Future Network APAN2008 January Myung-Ki SHIN, ETRI
Advertisements

Personal Networks and Their Federations Bernard Hammer TC32 chair Ecma/GA/2008/243.
Distributed Data Processing
Doc.: IEEE ban-LDR_PN_Apps Submission Jacksonville, FL May 2006 J. Farserotu, CSEM, CHSlide 1 Project: IEEE P Working Group for.
Omniran TG 1 Cooperation for OmniRAN P802.1CF Max Riegel, NSN (Chair OmniRAN TG)
1 Improving Efficiency, Reliability and Security in the Mobile Communications & Data Environment Coban User Group 2013, Rob Boback – Public Safety Sales.
Ch. 7. Architecture Standardization for WoT
8.
Technical Architectures
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Quality of Service in IN-home digital networks Alina Albu 22 July 2003.
1 6/11/ :41 Chapter 10Wireless LANs1 Rivier College CS575: Advanced LANs Chapter 10: Wireless LANs.
Chapter Nine NetWare-Based Networking. Objectives Identify the advantages of using the NetWare network operating system Describe NetWare’s server hardware.
Chapter 41 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
DAKNET Presented By: rreema.
Smart Integrated Infrastructure The Progression of Smart Grid Presentation to National League of Cities Martin G. Travers – President, Telecommunications.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
FI-WARE – Future Internet Core Platform FI-WARE Interface to Networks and Devices (I2ND) July 2011 High-level description.
Ss Cyril and Methodius University – Skopje Faculty of Electrical Engineering and Information Technologies (FEEIT) Institute of Telecommunications VIPSI.
MICA: A Wireless Platform for Deeply Embedded Networks
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Norbert Niebert, Andreas Schieder, Henrik Abramowicz, Christian Prehofer, Holger Kart Ambient Networks projects, EU’s 6 th Framework Programme
Virtualization Lab 3 – Virtualization Fall 2012 CSCI 6303 Principles of I.T.
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
Apartado Porto Codexwww.inescporto.pt tel (351) fax (351) /April/2005 Research Activities in 4G Networks at INESC Porto.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Overview of Research Activities Aylin Yener
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
A Study of Wireless Virtual Network Computing Kiran Erra.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Jini Architectural Overview Li Ping
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Mobile Computing and Wireless Communication Pisa 26 November 2002 Roberto Baldoni University of Roma “La Sapienza”
WLAN.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
1 © NOKIA WWRF-Reference-Framework.PPT/ 26 June 2002 / Kimmo Raatikainen WWRF Reference Framework Nokia’s Perspective WWRF WG2 Meeting 26 June 2002 Kimmo.
Communication and Security in Machine-to-Machine Systems Date │ Reporter │ 李雅樺 1.
Slide 1 RFID Network Infrastructure Overview P. Krishna Reva Systems.
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
Doc.: IEEE /0037r0 Submission February 2010 Joe Kwak (InterDigital)Slide 1 TVWS Architecture for SDD Date: Authors: Notice: This document.
INTRODUCTION:- The approaching 4G (fourth generation) mobile communication systems are projected to solve still-remaining problems of 3G (third generation)
Internet of Things. Creating Our Future Together.
Doc.: IEEE /182r0 Submission March 2002 Brüninghaus / Euscher / Kockmann, Siemens.Slide 1 Home Networking Requirements & Aspects for Next Generation.
Basic Concepts Key Learning Points : The objectives of this chapter are as follows:  To provide an introduction to the basic Concepts of enterprise architectures,
Submission May 2016 H. H. LEESlide 1 IEEE Framework and Its Applicability to IMT-2020 Date: Authors:
5G. Overall Vision for 5G 5G will provide users with fiber-like access data rate and "zero" latency user experience be capable of connecting 100 billion.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
HP Network and Service Provider Business Unit Sebastiano Tevarotto February 2003.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
MOBILE COMMUNICATION SYSTEM
A brief introduction to IoT gateway
4G-WIRELESS NETWORKS PREPARED BY: PARTH LATHIGARA(07BEC037)
Virtual Private Ad Hoc Networks Next-generation network communication
A Study of Wireless Virtual Network Computing
Networking: Discovery, Communication, Collaboration
Presentation transcript:

Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE

Section 6.1 A VISION OF A PERSONAL NETWORK

6.1 A VISION OF A PERSONAL NETWORK

6.1 A VISION OF A PERSONAL NETWORK(PN) Application may run locally or remotely, but the service is end-to-end. A PN may not be needed to run an application, but it is always needed to support personal services.

Section 6.2 SOME EXAMPLE SCENARIOS

6.2.1 Health

Based on these figures, it can be seen that diabetes requires low-data-rate (LDR) communication. Depending on the combination of sensors. Actual data rates would be somewhat higher given the protocol overhead.

6.2.2 Home and Daily Life The use of nomadic PANs is not limited to homes in this context; it may readily be extended to vehicles and other homes away from home. There is a lot of efficiency to be gained from collecting context data and linking this to personal data available through networks. Adding presence information to the digital life recorded and categorizing certain context groupings can also yield interesting efficiency gains.

6.2.3 Distributed Work Distributed work is typified by cooperation between multiple individuals working toward a common goal. Examples of distributed work scenarios include: † Journalists and mass media covering a story † Students working on a common project † Researchers in cooperating projects Collaborations may also extend beyond personal networks to what may be referred to as federated networks.

Section 6.3 SYSTEM AND REQUIREMENTS

6.3 SYSTEM AND REQUIREMENTS The functional requirements for wireless communication in the P-PAN may be summarized as follows: Short range Low power Low cost Good coexistence Robust, simple-to-use, and reliable devices Small, highly portable, and efficient Go-anywhere operation Secure and trusted

6.3 SYSTEM AND REQUIREMENTS

Section 6.4 USER REQUIREMENTS AND SCENARIOS

6.4 USER REQUIREMENTS AND SCENARIOS High-level security requirements for the PN infrastructure must be defined for both entities: Individual (unknown) ad hoc PN user. An existing PAN or PN (or group of them) configuration capable of providing connection to any user type requesting services.

Section 6.5 NETWORK ARCHITECTURE

6.5 NETWORK ARCHITECTURE Key issues with respect to Secure PNs include integration into: 1. Heterogeneous networks, 2. Addressing, 3. PN protocols (e.g., secure remote service discovery), 4. Mobility, 5. Handover

Section 6.6 ACCESS AND ACCESS CONTROL TECHNIQUES

6.6 ACCESS AND ACCESS CONTROL TECHNIQUES The (Air Interface) AI solutions can be divided into two broad categories: 1. Low-complexity PHYMAC solutions for simple, 2. High-performance solutions for high-data-rate (HDR) applications. Frequency Modulation UWB (FM-UWB) Multicarrier Spread Spectrum (MC-SS)

Section 6.7 SECURITY

6.7 SECURITY Security for LDR devices (e.g., sensors) typically consists of five components: Sensing hardware, Memory, Battery, Embedded processor, Transceiver Provide security in LDR environments based on service-aware adaptive security architecture.

Section 6.8 DEVICES AND SERVICE PLATFORMS

6.8 DEVICES AND SERVICE PLATFORMS More capable gateway devices would support the PAN air interfaces along with one or more legacy technologies to connect to the core network. By password protection and smart card technology. It is not enough to create a secure end-to-end PN from one person or device to another.

Section 6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES

6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES More capable gateway devices would support the PAN air interfaces along with one or more legacy technologies to connect to the core network: 1. Home area networks (HANs) 2. Vehicular area networks (VANs) 3. Enterprise networks (ENs) 4. Wireless sensor networks (WSNs)

6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES The operator network enables wide-area connectivity to interconnect the various personal domains that may be geographically distributed. Such connections may be layer 2 or network-layer tunnels to ensure security in addition to device- and application-level security under the control of the user ’ s own network domains

Section 6.10 TOWARD PERSONAL SERVICES OVER PERSONAL NETWORKS

6.10 TOWARD PERSONAL SERVICES OVER PERSONAL NETWORKS Need to build more than the networks, devices, and applications. Need to build the business and establish trust

Section 6.11 CONCLUSIONS

6.11 CONCLUSIONS Described how a home network can evolve into a secured virtual home network. Defined such a network as a personal network (PN). Developed a number of data exchange requirements, functional requirements, and overall system requirements for PNs and personal PANs.