scispace - formally typeset
Journal ArticleDOI

Security in wireless residential networks

Reads0
Chats0
TLDR
An overview of wireless residential networks, security issues for these networks and security in current wireless technologies such as IEEE 802.11 and Bluetooth are provided and a security architecture based on a classification of security services, containment and algorithm agility that will be suitable for wireless residential Networks is suggested.
Abstract
The installation rate of residential networks is expected to accelerate in the next few years with wireless networking being by far the technology of choice due to attractive features such as ease of use A wide variety of traditional computing devices and embedded Internet appliances will be networked in homes However, due to the broadcast nature of these networks and the heterogeneity of devices on these networks, new security problems will arise since the different types of devices have different security requirements and capabilities We provide an overview of wireless residential networks, security issues for these networks and security in current wireless technologies such as IEEE 80211 and Bluetooth We then suggest a security architecture based on a classification of security services, containment and algorithm agility that will be suitable for wireless residential networks

read more

Citations
More filters
Journal ArticleDOI

Bluetooth telemedicine Processor for multichannel biomedical signal transmission via mobile cellular networks

TL;DR: The paper focuses on the design of a processor, which samples signals from sensors on the patient, and transmits digital data over a Bluetooth link to a mobile telephone that uses the General Packet Radio Service.
Proceedings ArticleDOI

Wireless security threat taxonomy

D. Welch, +1 more
TL;DR: This work presents a wireless threat taxonomy that was used to build the security architecture for the wireless network at West Point and shows the different characteristics of wireless networks.
Journal ArticleDOI

Broadband and mobile opportunities: A socio-technical perspective

TL;DR: This paper provides a brief overview of broadband and mobile technologies from a socio-technical perspective, organizes and surveys relevant literature and focuses on emerging issues with broadband connectivity where research will help shape policy, strategy and the use of broadband networks.
Patent

Apparatus and method for wireless/wired communications interface

TL;DR: In this paper, an apparatus and method for wireless/wired Bluetooth communications interface detection is described, which includes detection of a communications configuration of a device as one of a wireless communications interface and a wireless/wireless communications interface.
Book

Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications

TL;DR: This chapter presents the concept of Smart Home, describes the Smart Home networking technologies and discusses the main issues for ensuring security in a Smart Home environment, to provide a base to broaden the research in Smart Home security.
References
More filters
Book

Cryptography: Theory and Practice

TL;DR: The object of the book is to produce a general, comprehensive textbook that treats all the essential core areas of cryptography.
Journal ArticleDOI

IEEE 802.11 Wireless Local Area Networks

TL;DR: The performance investigation reveals that an IEEE 802.11 network may be able to carry traffic with time-bounded requirements using the point coordination function, however, the findings suggest that packetized voice traffic must be handled in conjunction with an echo canceler.
Book ChapterDOI

Security Weaknesses in Bluetooth

TL;DR: A range of methods can be employed to strengthen the protocol and prevent the newly discovered attacks, including a location attack, which can be used for industrial espionage, blackmail, and other undesirable activities.
Journal ArticleDOI

Networks for homes

A. Dutta-Roy
- 01 Dec 1999 - 
TL;DR: To succeed, home networks will have to be based on standard products operable with any of the media, plus a widely accepted operating system, to be inexpensive, easy to install and the software easy to configure and operate.
Journal ArticleDOI

The KryptoKnight family of light-weight protocols for authentication and key distribution

TL;DR: The paper argues that key distribution may require substantially different approaches in different network environments and shows that the proposed family of protocols offers a flexible palette of compatible solutions addressing many different networking scenarios.
Related Papers (5)