Home Page Icon
Home Page
Table of Contents for
Footnote
Close
Footnote
by Loren Schwiebert, Golden Richard III, Sandeep Gupta, Frank Adelstein
Fundamentals of Mobile and Pervasive Computing
Cover page
Fundamentals of Mobile and Pervasive Computing
Copyright Page
Dedication
Contents
Preface
Acknowledgments
Chapter 1. Mobile Adaptive Computing
1.1 What Is Mobile Computing?
1.2 Adaptability-The Key to Mobile Computing
1.2.1 Transparency
1.2.2 Constraints of mobile computing environments
1.2.3 Application-aware adaptation
1.3 Mechanisms for Adaptation
1.3.1 Adapting functionality
1.3.2 Adapting data
1.4 How to Develop or Incorporate Adaptations in Applications
1.4.1 Where can adaptations be performed?
1.5 Support for Building Adaptive Mobile Applications
1.5.1 Odyssey
1.5.2 Rover
1.6 Summary
Chapter 2. Mobility Management
2.1 Mobility Management
2.2 Location Management Principles and Techniques
2.2.1 Registration area-based location management
2.3 Location Management Case Studies
2.3.1 PCS location management scheme
2.3.2 Mobile IP
2.4 Summary
Chapter 3. Data Dissemination and Management
3.1 Challenges
3.2 Data Dissemination
3.2.1 Bandwidth allocation for publishing
3.2.2 Broadcast disk scheduling
3.3 Mobile Data Caching
3.3.1 Caching in traditional distributed systems
3.3.2 Cache consistency maintenance
3.3.3 Performance and architectural issues
3.4 Mobile Cache Maintenance Schemes
3.4.1 A taxonomy of cache maintenance schemes
3.4.2 Cache maintenance for push-based information dissemination
3.4.3 Broadcasting invalidation reports
3.4.4 Disconnected operation
3.4.5 Asynchronous stateful (AS) scheme
3.4.6 To cache or not to cache?
3.5 Mobile Web Caching
3.5.1 Handling disconnections
3.5.2 Achieving energy and bandwidth efficiency
3.6 Summary
Chapter 4. Context-Aware Computing
4.1 Ubiquitous or Pervasive Computing
4.2 What Is a Context? Various Definitions and Types of Contexts
4.2.1 Enumeration-based
4.2.2 Role-based
4.3 Context-Aware Computing and Applications
4.3.1 Core capabilities for context awareness
4.3.2 Types of context-aware applications
4.3.3 Developing context-aware applications
4.4 Middleware Support
4.4.1 Contextual services
4.4.2 Actuator service
4.4.3 An example: context toolkit
4.4.4 Providing location context
4.5 Summary
Chapter 5. Introduction to Mobile Middleware
5.1 What Is Mobile Middleware?
5.2 Adaptation
5.3 Agents
5.4 Service Discovery
Chapter 6. Middleware for Application Development: Adaptation and Agents
6.1 Adaptation
6.1.1 The spectrum of adaptation
6.1.2 Resource monitoring
6.1.3 Characterizing adaptation strategies
6.1.4 An application-aware adaptation architecture: Odyssey
6.1.5 A sample Odyssey application
6.1.6 More adaptation middleware
6.2 Mobile Agents
6.2.1 Why mobile agents? And why not?
6.2.2 Agent architectures
6.2.3 Migration strategies
6.2.4 Communication strategies
6.3 Summary
Chapter 7. Service Discovery Middleware: Finding Needed Services
7.1 Common Ground
7.2 Services
7.2.1 Universally unique identifiers
7.2.2 Standardization
7.2.3 Textual descriptions
7.2.4 Using interfaces for standardization
7.3 More on Discovery and Advertisement Protocols
7.3.1 Unicast discovery
7.3.2 Multicast discovery and advertisement
7.3.3 Service catalogs
7.4 Garbage Collection
7.4.1 Leasing
7.4.2 Advertised expirations
7.5 Eventing
7.6 Security
7.6.1 Jini
7.6.2 Service location protocol
7.6.3 Ninja
7.7 Interoperability
7.7.1 Interoperability success stories
7.8 Summary
Chapter 8. Introduction to Ad Hoc and Sensor Networks
8.1 Overview
8.1.1 Outline of chapter
8.2 Properties of an Ad Hoc Network
8.2.1 No preexisting infrastructure
8.2.2 Limited access to a base station
8.2.3 Power-limited devices
8.2.4 No centralized mechanisms
8.3 Unique Features of Sensor Networks
8.3.1 Direct interaction with the physical world
8.3.2 Usually special-purpose devices
8.3.3 Very limited resources
8.3.4 Operate without a human interface
8.3.5 Specialized routing patterns
8.4 Proposed Applications
8.4.1 Military applications
8.4.2 Medical applications
8.4.3 Industrial applications
8.4.4 Environmental applications
8.4.5 Other application domains
Chapter 9. Challenges
9.1 Constrained Resources
9.1.1 No centralized authority
9.1.2 Limited power
9.1.3 Wireless communication
9.1.4 Limited computation and storage
9.1.5 Storage constraints
9.1.6 Limited input and output options
9.2 Security
9.2.1 Small keys
9.2.2 Limited computation
9.2.3 Changing network membership
9.2.4 Arbitrary topology
9.3 Mobility
9.3.1 Mobility requirements
9.3.2 Loss of connectivity
9.3.3 Data loss
9.3.4 Group communication
9.3.5 Maintaining consistent views
9.4 Summary
Chapter 10. Protocols
10.1 Autoconfiguration
10.1.1 Neighborhood discovery
10.1.2 Topology discovery
10.1.3 Medium access control schedule construction
10.1.4 Security protocol configuration
10.2 Energy-Efficient Communication
10.2.1 Multihop routing
10.2.2 Communication scheduling
10.2.3 Duplicate message suppression
10.2.4 Message aggregation
10.2.5 Dual-radio scheduling
10.2.6 Sleep-mode scheduling
10.2.7 Clustering
10.3 Mobility Requirements
10.3.1 Movement detection
10.3.2 Patterns of movement
10.3.3 Changing group dynamics
10.3.4 Resynchronization
10.4 Summary
Chapter 11. Approaches and Solutions
11.1 Deployment and Configuration
11.1.1 Random deployment
11.1.2 Scalability
11.1.3 Self-organization
11.1.4 Security protocol configuration
11.1.5 Reconfiguration/redeployment
11.1.6 Location determination
11.2 Routing
11.2.1 Event-driven routing
11.2.2 Periodic sensor readings
11.2.3 Diffusion routing
11.2.4 Directional routing
11.2.5 Group communication
11.2.6 Synchronization
11.3 Fault Tolerance and Reliability
11.3.1 FEC and ARQ
11.3.2 Agreement among sensor nodes (Reliability of measurements)
11.3.3 Dealing with dead or faulty nodes
11.4 Energy Efficiency
11.4.1 Uniform power dissipation
11.4.2 Sensor component power management
11.4.3 MAC layer protocols
11.4.4 Tradeoffs between performance and energy efficiency
11.5 Summary
Chapter 12. Wireless Security
12.1 Traditional Security Issues
12.1.1 Integrity
12.1.2 Confidentiality
12.1.3 Nonrepudiation
12.1.4 Availability
12.2 Mobile and Wireless Security Issues
12.2.1 Detectability
12.2.2 Resource depletion/exhaustion
12.2.3 Physical intercept problems
12.2.4 Theft of service
12.2.5 War driving/walking/chalking
12.3 Mobility
12.4 Problems in Ad Hoc Networks
12.4.1 Routing
12.4.2 Prekeying
12.4.3 Reconfiguring
12.4.4 Hostile environment
12.5 Additional Issues: Commerce
12.5.1 Liability
12.5.2 Fear, uncertainty, and doubt
12.5.3 Fraud
12.5.4 Big bucks at stake
12.6 Additional Types of Attacks
12.6.1 "Man in the middle" attacks
12.6.2 Traffic analysis
12.6.3 Replay attacks
12.6.4 Buffer-overflow attacks
12.7 Summary
Chapter 13. Approaches to Security
13.1 Limit the Signal
13.1.1 Wire integrity and tapping
13.1.2 Physical limitation
13.2 Encryption
13.2.1 Public and private key encryption
13.2.2 Computational and data overhead
13.3 Integrity Codes
13.3.1 Checksum versus cryptographic hash
13.3.2 Message authentication code (MAC)
13.3.3 Payload versus header
13.3.4 Traffic analysis
13.4 IPSec
13.4.1 Authentication header (AH)
13.4.2 Encapsulating security payload (ESP)
13.5 Other Security-Related Mechanisms
13.5.1 Authentication protocols
13.5.2 AAA
13.5.3 Special hardware
13.6 Summary
Chapter 14. Security in Wireless Personal Area Networks
14.1 Basic Idea
14.1.1 Bluetooth specifications
14.1.2 Bluetooth network terms
14.1.3 Bluetooth security mechanisms
14.2 Bluetooth Security Modes
14.3 Basic Security Mechanisms
14.3.1 Initialization key
14.3.2 Unit key
14.3.3 Combination key
14.3.4 Master key
14.4 Encryption
14.5 Authentication
14.6 Limitations and Problems
14.7 Summary
Chapter 15. Security in Wireless Local Area Networks
15.1 Basic Idea
15.2 Wireless Alphabet Soup
15.3 Wired-Equivalent Privacy (WEP)
15.3.1 WEP goals
15.3.2 WEP data frame
15.3.3 WEP encryption
15.3.4 WEP decryption
15.3.5 WEP authentication
15.3.6 WEP flaws
15.3.7 WEP fixes
15.4 WPA
15.5 802.11i
15.5.1 Encryption protocols
15.5.2 Access control via 802.1x
15.6 Fixes and "Best Practices"
15.6.1 Anything is better than nothing
15.6.2 Know thine enemy
15.6.3 Use whatever wireless security mechanisms are present
15.6.4 End-to-end VPN
15.6.5 Firewall protection
15.6.6 Use whatever else is available
15.7 Summary
Chapter 16. Security in Wireless Metropolitan Area Networks (802.16)
16.1 Broadband Wireless Access
16.2 IEEE 802.16
16.3 802.16 Security
16.3.1 Key management
16.3.2 Security associations
16.3.3 Keying material lifetime
16.3.4 Subscriber station (SS) authorization
16.3.5 Encryption
16.4 Problems and Limitations
16.5 Summary
Chapter 17. Security in Wide Area Networks
17.1 Basic Idea
17.2 CDMA
17.3 GSM
17.3.1 GSM authentication
17.3.2 GSM encryption
17.4 Problems with GSM Security
17.4.1 Session life
17.4.2 Weak encryption algorithm
17.4.3 Encryption between mobile host and base station only
17.4.4 Limits to the secret key
17.4.5 Other problems
17.5 The Four Generations of Wireless: 1G-4G
17.6 3G
17.7 Limitations
17.8 Summary
Appendix A Brief Introduction to Wireless Communication and Networking
Appendix B Questions
Index
About the author
Footnote
pg201
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
About the author
1
RSA is named after its inventors: Ronald L. Rivest, Adi Shamir, and Leonard Adleman.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset