Journal ArticleDOI
Security in wireless residential networks
Reads0
Chats0
TLDR
An overview of wireless residential networks, security issues for these networks and security in current wireless technologies such as IEEE 802.11 and Bluetooth are provided and a security architecture based on a classification of security services, containment and algorithm agility that will be suitable for wireless residential Networks is suggested.Abstract:
The installation rate of residential networks is expected to accelerate in the next few years with wireless networking being by far the technology of choice due to attractive features such as ease of use A wide variety of traditional computing devices and embedded Internet appliances will be networked in homes However, due to the broadcast nature of these networks and the heterogeneity of devices on these networks, new security problems will arise since the different types of devices have different security requirements and capabilities We provide an overview of wireless residential networks, security issues for these networks and security in current wireless technologies such as IEEE 80211 and Bluetooth We then suggest a security architecture based on a classification of security services, containment and algorithm agility that will be suitable for wireless residential networksread more
Citations
More filters
Journal ArticleDOI
Bluetooth telemedicine Processor for multichannel biomedical signal transmission via mobile cellular networks
TL;DR: The paper focuses on the design of a processor, which samples signals from sensors on the patient, and transmits digital data over a Bluetooth link to a mobile telephone that uses the General Packet Radio Service.
Proceedings ArticleDOI
Wireless security threat taxonomy
D. Welch,S. Lathrop +1 more
TL;DR: This work presents a wireless threat taxonomy that was used to build the security architecture for the wireless network at West Point and shows the different characteristics of wireless networks.
Journal ArticleDOI
Broadband and mobile opportunities: A socio-technical perspective
TL;DR: This paper provides a brief overview of broadband and mobile technologies from a socio-technical perspective, organizes and surveys relevant literature and focuses on emerging issues with broadband connectivity where research will help shape policy, strategy and the use of broadband networks.
Patent
Apparatus and method for wireless/wired communications interface
TL;DR: In this paper, an apparatus and method for wireless/wired Bluetooth communications interface detection is described, which includes detection of a communications configuration of a device as one of a wireless communications interface and a wireless/wireless communications interface.
Book
Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications
TL;DR: This chapter presents the concept of Smart Home, describes the Smart Home networking technologies and discusses the main issues for ensuring security in a Smart Home environment, to provide a base to broaden the research in Smart Home security.
References
More filters
Book
Cryptography: Theory and Practice
TL;DR: The object of the book is to produce a general, comprehensive textbook that treats all the essential core areas of cryptography.
Journal ArticleDOI
IEEE 802.11 Wireless Local Area Networks
TL;DR: The performance investigation reveals that an IEEE 802.11 network may be able to carry traffic with time-bounded requirements using the point coordination function, however, the findings suggest that packetized voice traffic must be handled in conjunction with an echo canceler.
Book ChapterDOI
Security Weaknesses in Bluetooth
Markus Jakobsson,Susanne Wetzel +1 more
TL;DR: A range of methods can be employed to strengthen the protocol and prevent the newly discovered attacks, including a location attack, which can be used for industrial espionage, blackmail, and other undesirable activities.
Journal ArticleDOI
Networks for homes
TL;DR: To succeed, home networks will have to be based on standard products operable with any of the media, plus a widely accepted operating system, to be inexpensive, easy to install and the software easy to configure and operate.
Journal ArticleDOI
The KryptoKnight family of light-weight protocols for authentication and key distribution
TL;DR: The paper argues that key distribution may require substantially different approaches in different network environments and shows that the proposed family of protocols offers a flexible palette of compatible solutions addressing many different networking scenarios.