E-Book, Englisch, 435 Seiten
Prasad My personal Adaptive Global NET (MAGNET)
2010
ISBN: 978-90-481-3437-3
Verlag: Springer Netherlands
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 435 Seiten
Reihe: Signals and Communication Technology
ISBN: 978-90-481-3437-3
Verlag: Springer Netherlands
Format: PDF
Kopierschutz: 1 - PDF Watermark
Every endeavour is covered by some fault, just as ?re is covered by smoke. Therefore one should not give up the work born of his nature, even if such work is full of fault. - The Bhagvad-Gita (18.48) This book is the outcome of the research and developmentcontributions of partners from three different continents, Asia, Europe, America, coming from universities, research centers, industrial partners and SMEs (Small and Medium Enterprise), all of them collaborating in MAGNET (My Adaptive Personal Global Net) and MAGNET Beyond project supported by European Commission within the Sixth Framework Programme (FP6). The project was focusing on a secure user-centric approach developingsecure Personal Networks in multi-network,multi-device, and multi-user environments. The innovative concept of Personal Network (PN), which was introduced and developed in MAGNET, ?nds in this book the ?rst con?rmation of the success that the future of wireless communications is bound to achieve. The importance of this book is not only related to being the ?rst work on PNs, it also gives an overview of operation of a big project, like MAGNET, and in fact the organisation of the book re?ects how then project itself has been structured.
Autoren/Hrsg.
Weitere Infos & Material
1;My Personal Adaptive GlobalNET (MAGNET);1
1.1;1 Introduction;31
1.1.1;1.1 The Concept of Personal Networks;31
1.1.1.1;1.1.1 PN Networking;33
1.1.1.2;1.1.2 Service and Context Discovery;34
1.1.1.3;1.1.3 Advances in the State of the Art of PNs;35
1.1.2;1.2 The Concept of the PN-Federation;36
1.1.3;1.3 Optimised Air Interfaces for PAN, PN and PN-F Communications;37
1.1.4;1.4 Security, Privacy and Trust;40
1.1.5;1.5 PN Platforms;42
1.1.6;1.6 Preview of This Book;42
1.1.7;References;44
1.2;2 Users, Pilot Services and Market;46
1.2.1;2.1 Introduction;46
1.2.2;2.2 User Requirements;48
1.2.2.1;2.2.1 Participatory Design;49
1.2.2.2;2.2.2 The Elicitation Process;50
1.2.2.2.1;2.2.2.1 Idea Creation;50
1.2.2.2.2;2.2.2.2 User Scenarios;53
1.2.2.2.3;2.2.2.3 Use Cases in Summary;53
1.2.2.3;2.2.3 The Activity-Based Concept;54
1.2.3;2.3 User Profiles and Profile Management;55
1.2.3.1;2.3.1 Personalization and Service Adaptation;55
1.2.3.2;2.3.2 Modelling of User Profiles;58
1.2.3.3;2.3.3 Common Ontology for User Profiles and Context Information;61
1.2.3.4;2.3.4 Profile Management;63
1.2.3.4.1;2.3.4.1 Subscriber Data Management;65
1.2.3.4.2;2.3.4.2 Identity Management and the ``Digital Butler';69
1.2.3.5;2.3.5 Business Opportunities;70
1.2.3.5.1;2.3.5.1 Stakeholders;70
1.2.3.5.2;2.3.5.2 Single Sign-on and Personalization Aspects;71
1.2.4;2.4 Implementation of GUIs, General Services and Pilot Services;72
1.2.4.1;2.4.1 General Service Architecture;76
1.2.4.2;2.4.2 Lifestyle Companion;77
1.2.4.2.1;2.4.2.1 Check-In;78
1.2.4.2.2;2.4.2.2 Exercise Guiding;78
1.2.4.2.3;2.4.2.3 Weight Measuring;79
1.2.4.3;2.4.3 Icebreaker;79
1.2.4.3.1;2.4.3.1 Check-In;80
1.2.4.3.2;2.4.3.2 Matching Service;80
1.2.4.3.3;2.4.3.3 Community Building (CB);81
1.2.4.3.4;2.4.3.4 Presentation Service;81
1.2.5;2.5 Evaluation;82
1.2.5.1;2.5.1 Low Fidelity Evaluation;82
1.2.5.2;2.5.2 Final Usability Test (High Fidelity Test);84
1.2.5.2.1;2.5.2.1 Common Test for Icebreaker and Lifestyle Companion;85
1.2.5.2.2;2.5.2.2 Test with Icebreaker and Presentation Service;86
1.2.5.2.3;2.5.2.3 Test with Lifestyle Companion;86
1.2.5.3;2.5.3 Final Test Results;87
1.2.6;2.6 PN Business Models;88
1.2.6.1;2.6.1 Conceptual Framework;89
1.2.6.1.1;2.6.1.1 Users;90
1.2.6.1.2;2.6.1.2 Networks and Applications;91
1.2.6.2;2.6.2 Business Model Design Elements;93
1.2.6.2.1;2.6.2.1 Service Design;93
1.2.6.2.2;2.6.2.2 Technology Design;94
1.2.6.2.3;2.6.2.3 Organisation Design;96
1.2.6.2.4;2.6.2.4 Finance Design;97
1.2.7;2.7 Conclusions;101
1.2.8;References;102
1.3;3 PN Networking;104
1.3.1;3.1 Introduction;104
1.3.1.1;3.1.1 Personal Networking Concept;105
1.3.1.2;3.1.2 Comparison with Other Initiatives;107
1.3.2;3.2 PN Architecture;109
1.3.2.1;3.2.1 The Three Abstraction Levels View;109
1.3.2.2;3.2.2 Terminology;111
1.3.2.2.1;3.2.2.1 Common Terminology;111
1.3.2.2.2;3.2.2.2 Terms in Connectivity Abstraction Level;112
1.3.2.2.3;3.2.2.3 Terms in Network Abstraction Level;112
1.3.2.2.4;3.2.2.4 Terms in Service Abstraction Level;113
1.3.2.3;3.2.3 PN Federation;113
1.3.2.4;3.2.4 Service and Context Management for PNs;114
1.3.3;3.3 Self-organization at Network Level;114
1.3.3.1;3.3.1 Establishing a Secure PN;114
1.3.3.2;3.3.2 Universal Convergence Layer;117
1.3.3.2.1;3.3.2.1 High-Level Architecture;118
1.3.3.2.2;3.3.2.2 Multi-radio Management;118
1.3.3.2.3;3.3.2.3 Path Optimization;119
1.3.3.2.4;3.3.2.4 Neighbour Discovery;119
1.3.3.2.5;3.3.2.5 Authentication and Security;120
1.3.3.2.6;3.3.2.6 UCL Data Flow;123
1.3.3.2.7;3.3.2.7 Downstream Data Flow: Transmission;123
1.3.3.2.8;3.3.2.8 Upstream Data Flow: Reception;125
1.3.3.2.9;3.3.2.9 Contribution to PN;126
1.3.3.3;3.3.3 The Network Overlay Approach;126
1.3.3.3.1;3.3.3.1 Intra-cluster Routing Protocol;127
1.3.3.3.2;3.3.3.2 PN Formation and Maintenance;128
1.3.3.3.3;3.3.3.3 PN Agent Framework;128
1.3.3.3.4;3.3.3.4 Dynamic Tunnelling;134
1.3.3.3.5;3.3.3.5 Inter-cluster Routing;135
1.3.4;3.4 PN-Aware Service Management;136
1.3.4.1;3.4.1 Service Life Cycle Management;137
1.3.4.2;3.4.2 MAGNET Service Management Platform;139
1.3.4.3;3.4.3 PN Interactions with External Service Frameworks;142
1.3.4.4;3.4.4 Charging and Billing;144
1.3.5;3.5 Collaboration Between Users;145
1.3.5.1;3.5.1 Automatic, Profile Controlled Establishment of PN-F;147
1.3.5.1.1;3.5.1.1 PN-F Profile and PN-F Participation Profile;147
1.3.5.1.2;3.5.1.2 PN-F Participation;149
1.3.5.1.3;3.5.1.3 PN-F Formation;149
1.3.5.1.4;3.5.1.4 PN-F Use;149
1.3.5.1.5;3.5.1.5 PN-F Termination;149
1.3.5.2;3.5.2 Joining the PN Federations;150
1.3.5.2.1;3.5.2.1 PN-F Participation and Management;151
1.3.5.2.2;3.5.2.2 PN-F Network Overlay Formation;152
1.3.5.3;3.5.3 PN-F Service Management;152
1.3.6;3.6 PN Context Management;153
1.3.6.1;3.6.1 Network Organisation and Distribution of Context Information;155
1.3.6.2;3.6.2 Context Modelling;156
1.3.6.3;3.6.3 Context Access Language;158
1.3.6.4;3.6.4 Further Reading;159
1.3.7;3.7 Conclusions;160
1.3.8;References;161
1.4;4 PAN-Optimized Air Interfaces;164
1.4.1;4.1 Introduction;164
1.4.2;4.2 Air Interface Description;167
1.4.2.1;4.2.1 Low Data Rate Transmission with FM-UWB Modulation;167
1.4.2.1.1;4.2.1.1 PHY Layer;168
1.4.2.1.2;4.2.1.2 MAC Layer;179
1.4.2.2;4.2.2 High Data Rate Transmission with MC-SS Modulation;196
1.4.2.2.1;4.2.2.1 PHY Layer;196
1.4.2.2.2;4.2.2.2 MAC Layer;201
1.4.3;4.3 Performance Comparison of MB AIs with Existing Technologies;207
1.4.4;4.4 Advanced Topics in the Design of LDR and HDR AIS;208
1.4.4.1;4.4.1 Interference Mitigation and Spectrum Efficiency;208
1.4.4.1.1;4.4.1.1 AMC for Real Time or Streaming Media Transmission;208
1.4.4.1.2;4.4.1.2 Generic AMC for real time media transmission without ARQ;210
1.4.4.1.3;4.4.1.3 Generic AMC for real time media transmission with ARQ;222
1.4.4.1.4;4.4.1.4 Adaptation of generic AMC Schemes to the MAGNET HDR AI;225
1.4.4.1.5;4.4.1.5 Amplify-and-Forwarding Cooperative Transmission;226
1.4.4.2;4.4.2 PAN-to-PAN Communication;235
1.4.4.2.1;4.4.2.1 Parent-Child Communication Model;236
1.4.4.2.2;4.4.2.2 Scheduling Problems in the Parent-Child Model;237
1.4.4.2.3;4.4.2.3 Inter-PAN Communication Model;239
1.4.4.2.4;4.4.2.4 Capacity Analysis of HDR WPANs;247
1.4.4.2.5;4.4.2.5 Capacity for Voice Applications;249
1.4.4.3;4.4.3 Multimode Operation;254
1.4.4.3.1;4.4.3.1 Introduction;255
1.4.4.3.2;4.4.3.2 Coexistence Mechanisms;257
1.4.4.3.3;4.4.3.3 Performance Evaluation and Comparison;264
1.4.5;4.5 Conclusions;266
1.4.6;References;270
1.5;5 Security in PNs;273
1.5.1;5.1 Introduction;273
1.5.2;5.2 Security Evaluation: Threat Analysis;274
1.5.2.1;5.2.1 Threat Analysis Methodology;274
1.5.2.2;5.2.2 Threat Analysis of PN-F;277
1.5.2.3;5.2.3 Security Evaluation of PN-F Architecture;281
1.5.3;5.3 A User Centric Security Perspective;283
1.5.3.1;5.3.1 CASM Design;286
1.5.3.1.1;5.3.1.1 Security Agent;287
1.5.3.1.2;5.3.1.2 Trust Agent;287
1.5.3.1.3;5.3.1.3 Privacy Agent;289
1.5.3.1.4;5.3.1.4 Security Decision Point;289
1.5.3.2;5.3.2 Security Profiling and Associations to the User Profile;291
1.5.3.3;5.3.3 Integrating the VID Concept;293
1.5.4;5.4 PN Key Management;293
1.5.4.1;5.4.1 CPFP Stage 1: Initializing and Imprinting with PNCA;294
1.5.4.1.1;5.4.1.1 Imprinting Over Private PAC;295
1.5.4.1.2;5.4.1.2 Imprinting Over Public PAC;296
1.5.4.2;5.4.2 CPFP Stage 1: Getting Certificates from PNCA;296
1.5.4.3;5.4.3 CPFP Stage 2: Using ECMQV to Drive Shared Keys;298
1.5.4.4;5.4.4 Key Revocation Mechanism;299
1.5.4.5;5.4.5 PNCA Resilience;300
1.5.5;5.5 PN-F Key Management;301
1.5.5.1;5.5.1 PN-F Key Management in Infrastructure Based PN Federations;302
1.5.5.2;5.5.2 PN-F Key Management in Ad Hoc Based Federations;305
1.5.5.3;5.5.3 Security Association Between the PN-F Members;307
1.5.5.3.1;5.5.3.1 PN-F Key Based Security Association;307
1.5.5.3.2;5.5.3.2 PN-F Certificate Based Security Association;308
1.5.5.3.3;5.5.3.3 PNDS Certificate Based Security Association;308
1.5.5.4;5.5.4 Security Evaluation of PN-F Key Management Protocols;309
1.5.6;5.6 Conclusions;309
1.5.7;References;310
1.6;6 Link Level Prototypes;311
1.6.1;6.1 Introduction;311
1.6.2;6.2 Low Data Rate FM-UWB Prototype;312
1.6.2.1;6.2.1 General Architecture;312
1.6.2.2;6.2.2 Key Specifications;314
1.6.2.3;6.2.3 Low Power RF Chipsets for Low Band FM UWB;315
1.6.2.3.1;6.2.3.1 RF Low Band Transmitter;315
1.6.2.3.2;6.2.3.2 RF Low Band Receiver;319
1.6.2.4;6.2.4 Low Power RF Chipsets for High Band FM UWB;321
1.6.2.4.1;6.2.4.1 RF High Band Transmitter;323
1.6.2.4.2;6.2.4.2 RF High Band Receiver;325
1.6.2.5;6.2.5 Baseband Processing and Channel Coding;330
1.6.2.5.1;6.2.5.1 Receiver Sub Carrier Processing;330
1.6.2.5.2;6.2.5.2 FSK Demodulator;333
1.6.2.5.3;6.2.5.3 Channel Coding;334
1.6.2.6;6.2.6 MAC Layer and Connectivity;338
1.6.2.6.1;6.2.6.1 MAC Functionality;338
1.6.2.6.2;6.2.6.2 MAC Implementation Architecture;340
1.6.2.7;6.2.7 LDR Hardware Prototype;342
1.6.2.8;6.2.8 Key Test Results;344
1.6.3;6.3 High Data Rate MC-SS Prototype;346
1.6.3.1;6.3.1 General Architecture and Key Specifications;347
1.6.3.2;6.3.2 RF Front End for the MC-SS System;349
1.6.3.3;6.3.3 Baseband Processing and Channel Coding;351
1.6.3.3.1;6.3.3.1 Synchronization;351
1.6.3.3.2;6.3.3.2 Clock Management for Flexible Design;353
1.6.3.4;6.3.4 MAC Layer and Connectivity;354
1.6.3.5;6.3.5 SW-MAC Design;357
1.6.3.6;6.3.6 HW-MAC Primitives;358
1.6.3.7;6.3.7 HDR Hardware Prototype;359
1.6.3.8;6.3.8 HDR Key Test Results;360
1.6.4;6.4 Conclusions;362
1.6.5;References;363
1.7;7 PN Platforms;365
1.7.1;7.1 Introduction;365
1.7.2;7.2 Implementation of the PN and PN-F Concept;368
1.7.2.1;7.2.1 System Overview;368
1.7.2.1.1;7.2.1.1 Personal Network Implementation;370
1.7.2.1.2;7.2.1.2 Personal Network Federation Implementation;372
1.7.2.2;7.2.2 Trust Establishment Module;373
1.7.2.2.1;7.2.2.1 PN Device Initialization;373
1.7.2.2.2;7.2.2.2 Imprinting;375
1.7.2.2.3;7.2.2.3 Transitive Imprinting;377
1.7.2.2.4;7.2.2.4 Tunnel Key Generation;377
1.7.2.2.5;7.2.2.5 PN Node Revocation;377
1.7.2.2.6;7.2.2.6 Interfaces Supported;378
1.7.2.2.7;7.2.2.7 Cryptographic Primitives;379
1.7.2.3;7.2.3 Neighbour Discovery and Authentication Module;379
1.7.2.3.1;7.2.3.1 SW Architecture and Implementation Details;380
1.7.2.4;7.2.4 Universal Convergence Layer;385
1.7.2.4.1;7.2.4.1 SW Architecture and Implementation Details;386
1.7.2.5;7.2.5 PN Agent Framework;390
1.7.2.5.1;7.2.5.1 SW Architecture and Implementation Details;390
1.7.2.6;7.2.6 Dynamic Tunneling Framework;393
1.7.2.6.1;7.2.6.1 SW Architecture;393
1.7.2.6.2;7.2.6.2 Implementation Details;394
1.7.2.7;7.2.7 PN/PN-F Routing Framework;397
1.7.2.7.1;7.2.7.1 SW Architecture;397
1.7.2.7.2;7.2.7.2 Implementation Details;398
1.7.2.8;7.2.8 PN/PN-F Directory Service;405
1.7.2.8.1;7.2.8.1 SW Architecture and Implementation Details;408
1.7.2.9;7.2.9 Federation Manager;409
1.7.2.9.1;7.2.9.1 SW Architecture and Implementation Details;409
1.7.2.10;7.2.10 MAGNET Service Management Platform (MSMP);411
1.7.2.10.1;7.2.10.1 SW Architecture and Implementation Details;412
1.7.2.11;7.2.11 Secure Context Management Framework;416
1.7.2.11.1;7.2.11.1 Software Architecture and Implementation Details;417
1.7.2.11.2;7.2.11.2 CALA Application Interface;419
1.7.2.11.3;7.2.11.3 Configuration of Retrievers and Processing Units;419
1.7.2.12;7.2.12 MAGNET Air-Interfaces Driver;421
1.7.2.12.1;7.2.12.1 MAGNET USB Driver for Logics and Usage;422
1.7.2.12.2;7.2.12.2 SW Architecture and Implementation Details;422
1.7.3;7.3 Testbed Description;426
1.7.3.1;7.3.1 Testbed Objectives;427
1.7.3.2;7.3.2 Test Cases;428
1.7.3.3;7.3.3 Performance Evaluation;428
1.7.4;7.4 Conclusions;434
1.7.5;References;434
1.8;8 Standardisation and Exploitation;436
1.8.1;8.1 Introduction;436
1.8.2;8.2 Standardisation Activities and Impact;437
1.8.2.1;8.2.1 Standardisation Bodies and Related Contributions;439
1.8.2.1.1;8.2.1.1 IEEE Activities;440
1.8.2.1.2;8.2.1.2 ETSI Activities;440
1.8.2.1.3;8.2.1.3 Ecma Activities;441
1.8.2.1.4;8.2.1.4 IETF Activities;441
1.8.2.1.5;8.2.1.5 WWRF Activities;441
1.8.2.1.6;8.2.1.6 Concluding Remarks;442
1.8.2.2;8.2.2 Impact for Further Developments;442
1.8.3;8.3 Exploitation Activities;444
1.8.3.1;8.3.1 Exploitable Results;444
1.8.3.2;8.3.2 Prototype;446
1.8.3.3;8.3.3 Testbed and Demo Platform;447
1.8.3.4;8.3.4 Dissemination Activities;447
1.8.3.5;8.3.5 Project Influence;448
1.8.4;8.4 Conclusions;449
1.8.5;References;450
1.9;9 Conclusions and Future Work;451
1.9.1;9.1 Introduction;451
1.9.2;9.2 Summary of Research Achievements;451
1.9.3;9.3 Future Directions of Research for PN and PN-F;454
1.10;Index;456




