Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Similar presentations


Presentation on theme: "Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE."— Presentation transcript:

1 Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE

2 Section 6.1 A VISION OF A PERSONAL NETWORK

3

4 6.1 A VISION OF A PERSONAL NETWORK

5 6.1 A VISION OF A PERSONAL NETWORK(PN) Application may run locally or remotely, but the service is end-to-end. A PN may not be needed to run an application, but it is always needed to support personal services.

6 Section 6.2 SOME EXAMPLE SCENARIOS

7 6.2.1 Health

8 Based on these figures, it can be seen that diabetes requires low-data-rate (LDR) communication. Depending on the combination of sensors. Actual data rates would be somewhat higher given the protocol overhead.

9 6.2.2 Home and Daily Life The use of nomadic PANs is not limited to homes in this context; it may readily be extended to vehicles and other homes away from home. There is a lot of efficiency to be gained from collecting context data and linking this to personal data available through networks. Adding presence information to the digital life recorded and categorizing certain context groupings can also yield interesting efficiency gains.

10 6.2.3 Distributed Work Distributed work is typified by cooperation between multiple individuals working toward a common goal. Examples of distributed work scenarios include: † Journalists and mass media covering a story † Students working on a common project † Researchers in cooperating projects Collaborations may also extend beyond personal networks to what may be referred to as federated networks.

11 Section 6.3 SYSTEM AND REQUIREMENTS

12 6.3 SYSTEM AND REQUIREMENTS The functional requirements for wireless communication in the P-PAN may be summarized as follows: Short range Low power Low cost Good coexistence Robust, simple-to-use, and reliable devices Small, highly portable, and efficient Go-anywhere operation Secure and trusted

13 6.3 SYSTEM AND REQUIREMENTS

14 Section 6.4 USER REQUIREMENTS AND SCENARIOS

15 6.4 USER REQUIREMENTS AND SCENARIOS High-level security requirements for the PN infrastructure must be defined for both entities: Individual (unknown) ad hoc PN user. An existing PAN or PN (or group of them) configuration capable of providing connection to any user type requesting services.

16 Section 6.5 NETWORK ARCHITECTURE

17 6.5 NETWORK ARCHITECTURE Key issues with respect to Secure PNs include integration into: 1. Heterogeneous networks, 2. Addressing, 3. PN protocols (e.g., secure remote service discovery), 4. Mobility, 5. Handover

18 Section 6.6 ACCESS AND ACCESS CONTROL TECHNIQUES

19 6.6 ACCESS AND ACCESS CONTROL TECHNIQUES The (Air Interface) AI solutions can be divided into two broad categories: 1. Low-complexity PHYMAC solutions for simple, 2. High-performance solutions for high-data-rate (HDR) applications. Frequency Modulation UWB (FM-UWB) Multicarrier Spread Spectrum (MC-SS)

20 Section 6.7 SECURITY

21 6.7 SECURITY Security for LDR devices (e.g., sensors) typically consists of five components: Sensing hardware, Memory, Battery, Embedded processor, Transceiver Provide security in LDR environments based on service-aware adaptive security architecture.

22 Section 6.8 DEVICES AND SERVICE PLATFORMS

23 6.8 DEVICES AND SERVICE PLATFORMS More capable gateway devices would support the PAN air interfaces along with one or more legacy technologies to connect to the core network. By password protection and smart card technology. It is not enough to create a secure end-to-end PN from one person or device to another.

24 Section 6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES

25 6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES More capable gateway devices would support the PAN air interfaces along with one or more legacy technologies to connect to the core network: 1. Home area networks (HANs) 2. Vehicular area networks (VANs) 3. Enterprise networks (ENs) 4. Wireless sensor networks (WSNs)

26 6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES The operator network enables wide-area connectivity to interconnect the various personal domains that may be geographically distributed. Such connections may be layer 2 or network-layer tunnels to ensure security in addition to device- and application-level security under the control of the user ’ s own network domains

27 Section 6.10 TOWARD PERSONAL SERVICES OVER PERSONAL NETWORKS

28 6.10 TOWARD PERSONAL SERVICES OVER PERSONAL NETWORKS Need to build more than the networks, devices, and applications. Need to build the business and establish trust

29 Section 6.11 CONCLUSIONS

30 6.11 CONCLUSIONS Described how a home network can evolve into a secured virtual home network. Defined such a network as a personal network (PN). Developed a number of data exchange requirements, functional requirements, and overall system requirements for PNs and personal PANs.


Download ppt "Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE."

Similar presentations


Ads by Google