Top Banner
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE
30

Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Chapter 6

SECURE WIRELESS PERSONALNETWORKS: HOME EXTENDED

TO ANYWHERE

Page 2: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Section 6.1

A VISION OF A PERSONAL NETWORK

Page 3: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
Page 4: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.1 A VISION OF A PERSONAL NETWORK

Page 5: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.1 A VISION OF A PERSONAL NETWORK(PN) Application may run locally or remotely, but the se

rvice is end-to-end.

A PN may not be needed to run an application, but it is always needed to support personal services.

Page 6: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Section 6.2

SOME EXAMPLE SCENARIOS

Page 7: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.2.1 Health

Page 8: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.2.1 Health Based on these figures, it can be seen that diabete

s requires low-data-rate (LDR) communication.

Depending on the combination of sensors. Actual data rates would be somewhat higher given the protocol overhead.

Page 9: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.2.2 Home and Daily Life The use of nomadic PANs is not limited to homes in this cont

ext; it may readily be extended to vehicles and other homes away from home.

There is a lot of efficiency to be gained from collecting context data and linking this to personal data available through networks.

Adding presence information to the digital life recorded and categorizing certain context groupings can also yield interesting efficiency gains.

Page 10: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.2.3 Distributed Work

Distributed work is typified by cooperation between multiple individuals working toward a common goal.

Examples of distributed work scenarios include:† Journalists and mass media covering a story† Students working on a common project† Researchers in cooperating projects

Collaborations may also extend beyond personal networks to what may be referred to as federated networks.

Page 11: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Section 6.3

SYSTEM AND REQUIREMENTS

Page 12: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.3 SYSTEM AND REQUIREMENTS The functional requirements for wireless communicatio

n in the P-PAN may be summarized as follows:

Short range Low power Low cost Good coexistence Robust, simple-to-use, and reliable devices Small, highly portable, and efficient Go-anywhere operation Secure and trusted

Page 13: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.3 SYSTEM AND REQUIREMENTS

Page 14: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Section 6.4

USER REQUIREMENTS AND SCENARIOS

Page 15: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.4 USER REQUIREMENTS AND SCENARIOS

High-level security requirements for the PN infrastructure must be defined for both entities:

Individual (unknown) ad hoc PN user.

An existing PAN or PN (or group of them) configuration capable of providing connection to any user type requesting services.

Page 16: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Section 6.5

NETWORK ARCHITECTURE

Page 17: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.5 NETWORK ARCHITECTURE

Key issues with respect to Secure PNs include integration into:

1. Heterogeneous networks,2. Addressing, 3. PN protocols (e.g., secure remote service discover

y), 4. Mobility,5. Handover

Page 18: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Section 6.6

ACCESS AND ACCESS CONTROL TECHNIQUES

Page 19: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.6 ACCESS AND ACCESS CONTROL TECHNIQUES

The (Air Interface) AI solutions can be divided into two broad categories:

1. Low-complexity PHYMAC solutions for simple,

2. High-performance solutions for high-data-rate (HDR) applications.

Frequency Modulation UWB (FM-UWB)

Multicarrier Spread Spectrum (MC-SS)

Page 20: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Section 6.7

SECURITY

Page 21: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.7 SECURITYSecurity for LDR devices (e.g., sensors) typically consi

sts of five components: Sensing hardware, Memory, Battery, Embedded processor, Transceiver

Provide security in LDR environments based on service-aware adaptive security architecture.

Page 22: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Section 6.8

DEVICES AND SERVICE PLATFORMS

Page 23: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.8 DEVICES AND SERVICE PLATFORMS

More capable gateway devices would support the PAN air interfaces along with one or more legacy technologies to connect to the core network.

By password protection and smart card technology.

It is not enough to create a secure end-to-end PN from one person or device to another.

Page 24: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Section 6.9

SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES

Page 25: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES

More capable gateway devices would support the PAN air interfaces along with one or more legacy technologies to connect to the core network:

1. Home area networks (HANs)2. Vehicular area networks (VANs)3. Enterprise networks (ENs)4. Wireless sensor networks (WSNs)

Page 26: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.9 SYSTEM OPTIMIZATION AND OPERATOR PERSPECTIVES The operator network enables wide-area conn

ectivity to interconnect the various personal domains that may be geographically distributed.

Such connections may be layer 2 or network-layer tunnels to ensure security in addition to device- and application-level security under the control of the user’s own network domains

Page 27: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Section 6.10

TOWARD PERSONAL SERVICES OVER PERSONAL NETWORKS

Page 28: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.10 TOWARD PERSONAL SERVICES OVER PERSONAL NETWORKS

Need to build more than the networks, devices, and applications.

Need to build the business and establish trust

Page 29: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

Section 6.11

CONCLUSIONS

Page 30: Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.

6.11 CONCLUSIONS Described how a home network can evolve into a s

ecured virtual home network.

Defined such a network as a personal network (PN).

Developed a number of data exchange requirements, functional requirements, and overall system requirements for PNs and personal PANs.