My personal Adaptive Global NET (MAGNET) (eBook)

Ramjee Prasad (Herausgeber)

eBook Download: PDF
2009 | 2010
XXXIV, 435 Seiten
Springer Netherlands (Verlag)
978-90-481-3437-3 (ISBN)

Lese- und Medienproben

My personal Adaptive Global NET (MAGNET) -
Systemvoraussetzungen
149,79 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Every endeavour is covered by some fault, just as ?re is covered by smoke. Therefore one should not give up the work born of his nature, even if such work is full of fault. - The Bhagvad-Gita (18.48) This book is the outcome of the research and developmentcontributions of partners from three different continents, Asia, Europe, America, coming from universities, research centers, industrial partners and SMEs (Small and Medium Enterprise), all of them collaborating in MAGNET (My Adaptive Personal Global Net) and MAGNET Beyond project supported by European Commission within the Sixth Framework Programme (FP6). The project was focusing on a secure user-centric approach developingsecure Personal Networks in multi-network,multi-device, and multi-user environments. The innovative concept of Personal Network (PN), which was introduced and developed in MAGNET, ?nds in this book the ?rst con?rmation of the success that the future of wireless communications is bound to achieve. The importance of this book is not only related to being the ?rst work on PNs, it also gives an overview of operation of a big project, like MAGNET, and in fact the organisation of the book re?ects how then project itself has been structured.
Every endeavour is covered by some fault, just as ?re is covered by smoke. Therefore one should not give up the work born of his nature, even if such work is full of fault. - The Bhagvad-Gita (18.48) This book is the outcome of the research and developmentcontributions of partners from three different continents, Asia, Europe, America, coming from universities, research centers, industrial partners and SMEs (Small and Medium Enterprise), all of them collaborating in MAGNET (My Adaptive Personal Global Net) and MAGNET Beyond project supported by European Commission within the Sixth Framework Programme (FP6). The project was focusing on a secure user-centric approach developingsecure Personal Networks in multi-network,multi-device, and multi-user environments. The innovative concept of Personal Network (PN), which was introduced and developed in MAGNET, ?nds in this book the ?rst con?rmation of the success that the future of wireless communications is bound to achieve. The importance of this book is not only related to being the ?rst work on PNs, it also gives an overview of operation of a big project, like MAGNET, and in fact the organisation of the book re?ects how then project itself has been structured.

My Personal Adaptive GlobalNET (MAGNET) 1
1 Introduction 31
1.1 The Concept of Personal Networks 31
1.1.1 PN Networking 33
1.1.2 Service and Context Discovery 34
1.1.3 Advances in the State of the Art of PNs 35
1.2 The Concept of the PN-Federation 36
1.3 Optimised Air Interfaces for PAN, PN and PN-F Communications 37
1.4 Security, Privacy and Trust 40
1.5 PN Platforms 42
1.6 Preview of This Book 42
References 44
2 Users, Pilot Services and Market 46
2.1 Introduction 46
2.2 User Requirements 48
2.2.1 Participatory Design 49
2.2.2 The Elicitation Process 50
2.2.2.1 Idea Creation 50
2.2.2.2 User Scenarios 53
2.2.2.3 Use Cases in Summary 53
2.2.3 The Activity-Based Concept 54
2.3 User Profiles and Profile Management 55
2.3.1 Personalization and Service Adaptation 55
2.3.2 Modelling of User Profiles 58
2.3.3 Common Ontology for User Profiles and Context Information 61
2.3.4 Profile Management 63
2.3.4.1 Subscriber Data Management 65
2.3.4.2 Identity Management and the ``Digital Butler' 69
2.3.5 Business Opportunities 70
2.3.5.1 Stakeholders 70
2.3.5.2 Single Sign-on and Personalization Aspects 71
2.4 Implementation of GUIs, General Services and Pilot Services 72
2.4.1 General Service Architecture 76
2.4.2 Lifestyle Companion 77
2.4.2.1 Check-In 78
2.4.2.2 Exercise Guiding 78
2.4.2.3 Weight Measuring 79
2.4.3 Icebreaker 79
2.4.3.1 Check-In 80
2.4.3.2 Matching Service 80
2.4.3.3 Community Building (CB) 81
2.4.3.4 Presentation Service 81
2.5 Evaluation 82
2.5.1 Low Fidelity Evaluation 82
2.5.2 Final Usability Test (High Fidelity Test) 84
2.5.2.1 Common Test for Icebreaker and Lifestyle Companion 85
2.5.2.2 Test with Icebreaker and Presentation Service 86
2.5.2.3 Test with Lifestyle Companion 86
2.5.3 Final Test Results 87
2.6 PN Business Models 88
2.6.1 Conceptual Framework 89
2.6.1.1 Users 90
2.6.1.2 Networks and Applications 91
2.6.2 Business Model Design Elements 93
2.6.2.1 Service Design 93
2.6.2.2 Technology Design 94
2.6.2.3 Organisation Design 96
2.6.2.4 Finance Design 97
2.7 Conclusions 101
References 102
3 PN Networking 104
3.1 Introduction 104
3.1.1 Personal Networking Concept 105
3.1.2 Comparison with Other Initiatives 107
3.2 PN Architecture 109
3.2.1 The Three Abstraction Levels View 109
3.2.2 Terminology 111
3.2.2.1 Common Terminology 111
3.2.2.2 Terms in Connectivity Abstraction Level 112
3.2.2.3 Terms in Network Abstraction Level 112
3.2.2.4 Terms in Service Abstraction Level 113
3.2.3 PN Federation 113
3.2.4 Service and Context Management for PNs 114
3.3 Self-organization at Network Level 114
3.3.1 Establishing a Secure PN 114
3.3.2 Universal Convergence Layer 117
3.3.2.1 High-Level Architecture 118
3.3.2.2 Multi-radio Management 118
3.3.2.3 Path Optimization 119
3.3.2.4 Neighbour Discovery 119
3.3.2.5 Authentication and Security 120
3.3.2.6 UCL Data Flow 123
3.3.2.7 Downstream Data Flow: Transmission 123
3.3.2.8 Upstream Data Flow: Reception 125
3.3.2.9 Contribution to PN 126
3.3.3 The Network Overlay Approach 126
3.3.3.1 Intra-cluster Routing Protocol 127
3.3.3.2 PN Formation and Maintenance 128
3.3.3.3 PN Agent Framework 128
3.3.3.4 Dynamic Tunnelling 134
3.3.3.5 Inter-cluster Routing 135
3.4 PN-Aware Service Management 136
3.4.1 Service Life Cycle Management 137
3.4.2 MAGNET Service Management Platform 139
3.4.3 PN Interactions with External Service Frameworks 142
3.4.4 Charging and Billing 144
3.5 Collaboration Between Users 145
3.5.1 Automatic, Profile Controlled Establishment of PN-F 147
3.5.1.1 PN-F Profile and PN-F Participation Profile 147
3.5.1.2 PN-F Participation 149
3.5.1.3 PN-F Formation 149
3.5.1.4 PN-F Use 149
3.5.1.5 PN-F Termination 149
3.5.2 Joining the PN Federations 150
3.5.2.1 PN-F Participation and Management 151
3.5.2.2 PN-F Network Overlay Formation 152
3.5.3 PN-F Service Management 152
3.6 PN Context Management 153
3.6.1 Network Organisation and Distribution of Context Information 155
3.6.2 Context Modelling 156
3.6.3 Context Access Language 158
3.6.4 Further Reading 159
3.7 Conclusions 160
References 161
4 PAN-Optimized Air Interfaces 164
4.1 Introduction 164
4.2 Air Interface Description 167
4.2.1 Low Data Rate Transmission with FM-UWB Modulation 167
4.2.1.1 PHY Layer 168
4.2.1.2 MAC Layer 179
4.2.2 High Data Rate Transmission with MC-SS Modulation 196
4.2.2.1 PHY Layer 196
4.2.2.2 MAC Layer 201
4.3 Performance Comparison of MB AIs with Existing Technologies 207
4.4 Advanced Topics in the Design of LDR and HDR AIS 208
4.4.1 Interference Mitigation and Spectrum Efficiency 208
4.4.1.1 AMC for Real Time or Streaming Media Transmission 208
4.4.1.2 Generic AMC for real time media transmission without ARQ 210
4.4.1.3 Generic AMC for real time media transmission with ARQ 222
4.4.1.4 Adaptation of generic AMC Schemes to the MAGNET HDR AI 225
4.4.1.5 Amplify-and-Forwarding Cooperative Transmission 226
4.4.2 PAN-to-PAN Communication 235
4.4.2.1 Parent-Child Communication Model 236
4.4.2.2 Scheduling Problems in the Parent-Child Model 237
4.4.2.3 Inter-PAN Communication Model 239
4.4.2.4 Capacity Analysis of HDR WPANs 247
4.4.2.5 Capacity for Voice Applications 249
4.4.3 Multimode Operation 254
4.4.3.1 Introduction 255
4.4.3.2 Coexistence Mechanisms 257
4.4.3.3 Performance Evaluation and Comparison 264
4.5 Conclusions 266
References 270
5 Security in PNs 273
5.1 Introduction 273
5.2 Security Evaluation: Threat Analysis 274
5.2.1 Threat Analysis Methodology 274
5.2.2 Threat Analysis of PN-F 277
5.2.3 Security Evaluation of PN-F Architecture 281
5.3 A User Centric Security Perspective 283
5.3.1 CASM Design 286
5.3.1.1 Security Agent 287
5.3.1.2 Trust Agent 287
5.3.1.3 Privacy Agent 289
5.3.1.4 Security Decision Point 289
5.3.2 Security Profiling and Associations to the User Profile 291
5.3.3 Integrating the VID Concept 293
5.4 PN Key Management 293
5.4.1 CPFP Stage 1: Initializing and Imprinting with PNCA 294
5.4.1.1 Imprinting Over Private PAC 295
5.4.1.2 Imprinting Over Public PAC 296
5.4.2 CPFP Stage 1: Getting Certificates from PNCA 296
5.4.3 CPFP Stage 2: Using ECMQV to Drive Shared Keys 298
5.4.4 Key Revocation Mechanism 299
5.4.5 PNCA Resilience 300
5.5 PN-F Key Management 301
5.5.1 PN-F Key Management in Infrastructure Based PN Federations 302
5.5.2 PN-F Key Management in Ad Hoc Based Federations 305
5.5.3 Security Association Between the PN-F Members 307
5.5.3.1 PN-F Key Based Security Association 307
5.5.3.2 PN-F Certificate Based Security Association 308
5.5.3.3 PNDS Certificate Based Security Association 308
5.5.4 Security Evaluation of PN-F Key Management Protocols 309
5.6 Conclusions 309
References 310
6 Link Level Prototypes 311
6.1 Introduction 311
6.2 Low Data Rate FM-UWB Prototype 312
6.2.1 General Architecture 312
6.2.2 Key Specifications 314
6.2.3 Low Power RF Chipsets for Low Band FM UWB 315
6.2.3.1 RF Low Band Transmitter 315
6.2.3.2 RF Low Band Receiver 319
6.2.4 Low Power RF Chipsets for High Band FM UWB 321
6.2.4.1 RF High Band Transmitter 323
6.2.4.2 RF High Band Receiver 325
6.2.5 Baseband Processing and Channel Coding 330
6.2.5.1 Receiver Sub Carrier Processing 330
6.2.5.2 FSK Demodulator 333
6.2.5.3 Channel Coding 334
6.2.6 MAC Layer and Connectivity 338
6.2.6.1 MAC Functionality 338
6.2.6.2 MAC Implementation Architecture 340
6.2.7 LDR Hardware Prototype 342
6.2.8 Key Test Results 344
6.3 High Data Rate MC-SS Prototype 346
6.3.1 General Architecture and Key Specifications 347
6.3.2 RF Front End for the MC-SS System 349
6.3.3 Baseband Processing and Channel Coding 351
6.3.3.1 Synchronization 351
6.3.3.2 Clock Management for Flexible Design 353
6.3.4 MAC Layer and Connectivity 354
6.3.5 SW-MAC Design 357
6.3.6 HW-MAC Primitives 358
6.3.7 HDR Hardware Prototype 359
6.3.8 HDR Key Test Results 360
6.4 Conclusions 362
References 363
7 PN Platforms 365
7.1 Introduction 365
7.2 Implementation of the PN and PN-F Concept 368
7.2.1 System Overview 368
7.2.1.1 Personal Network Implementation 370
7.2.1.2 Personal Network Federation Implementation 372
7.2.2 Trust Establishment Module 373
7.2.2.1 PN Device Initialization 373
7.2.2.2 Imprinting 375
7.2.2.3 Transitive Imprinting 377
7.2.2.4 Tunnel Key Generation 377
7.2.2.5 PN Node Revocation 377
7.2.2.6 Interfaces Supported 378
7.2.2.7 Cryptographic Primitives 379
7.2.3 Neighbour Discovery and Authentication Module 379
7.2.3.1 SW Architecture and Implementation Details 380
7.2.4 Universal Convergence Layer 385
7.2.4.1 SW Architecture and Implementation Details 386
7.2.5 PN Agent Framework 390
7.2.5.1 SW Architecture and Implementation Details 390
7.2.6 Dynamic Tunneling Framework 393
7.2.6.1 SW Architecture 393
7.2.6.2 Implementation Details 394
7.2.7 PN/PN-F Routing Framework 397
7.2.7.1 SW Architecture 397
7.2.7.2 Implementation Details 398
7.2.8 PN/PN-F Directory Service 405
7.2.8.1 SW Architecture and Implementation Details 408
7.2.9 Federation Manager 409
7.2.9.1 SW Architecture and Implementation Details 409
7.2.10 MAGNET Service Management Platform (MSMP) 411
7.2.10.1 SW Architecture and Implementation Details 412
7.2.11 Secure Context Management Framework 416
7.2.11.1 Software Architecture and Implementation Details 417
7.2.11.2 CALA Application Interface 419
7.2.11.3 Configuration of Retrievers and Processing Units 419
7.2.12 MAGNET Air-Interfaces Driver 421
7.2.12.1 MAGNET USB Driver for Logics and Usage 422
7.2.12.2 SW Architecture and Implementation Details 422
7.3 Testbed Description 426
7.3.1 Testbed Objectives 427
7.3.2 Test Cases 428
7.3.3 Performance Evaluation 428
7.4 Conclusions 434
References 434
8 Standardisation and Exploitation 436
8.1 Introduction 436
8.2 Standardisation Activities and Impact 437
8.2.1 Standardisation Bodies and Related Contributions 439
8.2.1.1 IEEE Activities 440
8.2.1.2 ETSI Activities 440
8.2.1.3 Ecma Activities 441
8.2.1.4 IETF Activities 441
8.2.1.5 WWRF Activities 441
8.2.1.6 Concluding Remarks 442
8.2.2 Impact for Further Developments 442
8.3 Exploitation Activities 444
8.3.1 Exploitable Results 444
8.3.2 Prototype 446
8.3.3 Testbed and Demo Platform 447
8.3.4 Dissemination Activities 447
8.3.5 Project Influence 448
8.4 Conclusions 449
References 450
9 Conclusions and Future Work 451
9.1 Introduction 451
9.2 Summary of Research Achievements 451
9.3 Future Directions of Research for PN and PN-F 454
Index 456

Erscheint lt. Verlag 10.12.2009
Reihe/Serie Signals and Communication Technology
Zusatzinfo XXXIV, 435 p.
Verlagsort Dordrecht
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Weitere Themen Hardware
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Air interfaces • Communication • context management • Personal Area Network • Personal Networks • security • Ultra-Wideband • wireless communications • wireless networks
ISBN-10 90-481-3437-4 / 9048134374
ISBN-13 978-90-481-3437-3 / 9789048134373
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 11,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich