Transcript 投影片 1

Chapter 6
SECURE WIRELESS PERSONAL
NETWORKS: HOME EXTENDED
TO ANYWHERE
Section 6.1
A VISION OF A PERSONAL
NETWORK
6.1 A VISION OF A PERSONAL
NETWORK
6.1 A VISION OF A PERSONAL
NETWORK(PN)


Application may run locally or remotely, but the
service is end-to-end.
A PN may not be needed to run an application, but it
is always needed to support personal services.
Section 6.2
SOME EXAMPLE SCENARIOS
6.2.1 Health
6.2.1 Health


Based on these figures, it can be seen that diabetes
requires low-data-rate (LDR) communication.
Depending on the combination of sensors. Actual
data rates would be somewhat higher given the
protocol overhead.
6.2.2 Home and Daily Life



The use of nomadic PANs is not limited to homes in this context;
it may readily be extended to vehicles and other homes away
from home.
There is a lot of efficiency to be gained from collecting context
data and linking this to personal data available through
networks.
Adding presence information to the digital life recorded
and categorizing certain context groupings can also yield
interesting efficiency gains.
6.2.3 Distributed Work

Distributed work is typified by cooperation between multiple
individuals working toward a common goal.
Examples of distributed work scenarios include:
† Journalists and mass media covering a story
† Students working on a common project
† Researchers in cooperating projects


Collaborations may also extend beyond personal networks to
what may be referred to as federated networks.
Section 6.3
SYSTEM AND REQUIREMENTS
6.3 SYSTEM AND REQUIREMENTS
The functional requirements for wireless communication in
the P-PAN may be summarized as follows:








Short range
Low power
Low cost
Good coexistence
Robust, simple-to-use, and reliable devices
Small, highly portable, and efficient
Go-anywhere operation
Secure and trusted
6.3 SYSTEM AND REQUIREMENTS
Section 6.4
USER REQUIREMENTS AND
SCENARIOS
6.4 USER REQUIREMENTS AND
SCENARIOS
High-level security requirements for the PN
infrastructure must be defined for both entities:


Individual (unknown) ad hoc PN user.
An existing PAN or PN (or group of them)
configuration capable of providing connection to any
user type requesting services.
Section 6.5
NETWORK ARCHITECTURE
6.5 NETWORK ARCHITECTURE
Key issues with respect to Secure PNs include
integration into:
1. Heterogeneous networks,
2. Addressing,
3. PN protocols (e.g., secure remote service discovery),
4. Mobility,
5. Handover

Section 6.6
ACCESS AND ACCESS CONTROL
TECHNIQUES
6.6 ACCESS AND ACCESS CONTROL
TECHNIQUES
The (Air Interface) AI solutions can be divided into two
broad categories:
1. Low-complexity PHYMAC solutions for simple,
2. High-performance solutions for high-data-rate (HDR)
applications.

Frequency Modulation UWB (FM-UWB)

Multicarrier Spread Spectrum (MC-SS)
Section 6.7
SECURITY
6.7 SECURITY
Security for LDR devices (e.g., sensors) typically
consists of five components:
 Sensing hardware,
 Memory,
 Battery,
 Embedded processor,
 Transceiver

Provide security in LDR environments based on
service-aware adaptive security architecture.
Section 6.8
DEVICES AND SERVICE
PLATFORMS
6.8 DEVICES AND SERVICE
PLATFORMS



More capable gateway devices would support the
PAN air interfaces along with one or more legacy
technologies to connect to the core network.
By password protection and smart card technology.
It is not enough to create a secure end-to-end PN
from one person or device to another.
Section 6.9
SYSTEM OPTIMIZATION AND
OPERATOR PERSPECTIVES
6.9 SYSTEM OPTIMIZATION AND
OPERATOR PERSPECTIVES

1.
2.
3.
4.
More capable gateway devices would support the
PAN air interfaces along with one or more legacy
technologies to connect to the core network:
Home area networks (HANs)
Vehicular area networks (VANs)
Enterprise networks (ENs)
Wireless sensor networks (WSNs)
6.9 SYSTEM OPTIMIZATION AND
OPERATOR PERSPECTIVES


The operator network enables wide-area
connectivity to interconnect the various personal
domains that may be geographically distributed.
Such connections may be layer 2 or network-layer
tunnels to ensure security in addition to device- and
application-level security under the control of the
user’s own network domains
Section 6.10
TOWARD PERSONAL SERVICES OVER
PERSONAL NETWORKS
6.10 TOWARD PERSONAL SERVICES
OVER PERSONAL NETWORKS


Need to build more than the networks,
devices, and applications.
Need to build the business and establish trust
Section 6.11
CONCLUSIONS
6.11 CONCLUSIONS



Described how a home network can evolve into a
secured virtual home network.
Defined such a network as a personal network (PN).
Developed a number of data exchange requirements,
functional requirements, and overall system
requirements for PNs and personal PANs.