Security in Ad-hoc Networks

Size: px
Start display at page:

Download "Security in Ad-hoc Networks"

Transcription

1 1(12) Security in Ad-hoc Networks Anne Vanhala University of Helsinki Department of Computing Science Research seminar on Security in Distributed Systems Abstract A short-range wireless channel has security problems that differ from those of more conventional networks. This paper presents first the general features of ad-hoc networks. Characteristic security issues in ad-hoc networks will be enlightened next. Finally, an example of a short-range wireless network will be presented. The Bluetooth standard is described shortly as well as the found weaknesses in its security. 1. Introduction Cell phones as a means of managing the life of people will increase their popularity. These phones promise to extend the possibilities of commerce that in connections with cell phones is called mobile commerce, or shortly m-commerce. Mobile commerce will make commerce platforms more important, because in that way electronic and mobile commerce transactions will be open for wide markets. An important step towards the development and penetration on m-commerce is the employment of short-range wireless local area networks, such as Bluetooth. Also the consumer electronics has a tendency of having an embedded microprocessor in every device. This embedded networking is also suitable for Smart Information Services like alarms, electronic business cards etc. Shortly, networking will become more and more general. The principles of Wireless Local Area Network (WLAN) were defined in standard IEEE that was concluded in the end of 1997 [12]. It defines two different topologies: adhoc network and infrastructure network. An infrastructure network is an enlargement of a fixed network, where mobile devices can be connected to fixed network. An ad-hoc network is independent and it can consist of mobile devices supplied with cordless

2 2(12) adapters to network. These mobile devices form a point-to-point connection to every single device in this particular network Therefore an ad-hoc network is able to use only created wireless connection instead of fixed infrastructure. Wireless Local Area Network (WLAN) is sometimes called also as ad hoc network. Using radio frequency in WLAN brings us a problem of receiving signals inside the WLAN and weak signals in its near surrounding. This can be limited by using Frequency Hopping Spread Spectrum (FHSS), where frequencies vary randomly. WLAN based on microwave techniques have similar problems. Only WLAN based on infrared technique is secure in this sense, because the radiation cannot pass through walls. Generally, WLAN has more tendency to eavesdropping than fixed LAN. This paper can be divided into three main chapters in addition to introduction and conclusion. The first main chapter gives an overview of ad-hoc networks. Some ad-hoc networks are mentioned, and in third main chapter the security issues of an ad-hoc network named Bluetooth will be presented. The second main chapter enlightens the general security issues of an ad-hoc network. 2. Overview of Ad-hoc Networks Ad-hoc networks have characteristics that differ from those of more conventional networks. These networks have a short range of wireless channel. Some of the common features for such networks are that there is only little or no support infrastructure. This lack of infrastructure introduces problems in routing, name resolution, service discovery and security [1] [2]. The trust in the prior context of security can be transferred and transformed when providing security services. There is also absence of an online server that has its influence on security. In addition to all these the battery operated personal devices have constraints such as a peanut CPU, battery power and high latency. This may cause trade-off between security and constraints mentioned above. Several groups have built up their networks emphasizing different aspects such as Piconet [3], HomeRF [4], IrDA [5], Bluetooth [6,7,8] and IEEE 802 [12]. IrDA is based on infrared technology and the others use radio frequency. The comparison of wireless radio is presented in table 1. Piconet is a general purpose, low-powered, ad-hoc network, where security issues have not yet been of significant interest in designing and implementation. Piconet is a project at Olivetti and Oracle Research Laboratory (ORL). Its goal was to understand the provision of wireless connectivity. A Piconet node has been developed to provide a connection to this embedded network. It allows two devices near each other to interoperate. These devices can be either mobile or fixed. The range is said to be reasonably short.

3 3(12) Table 1: Wireless radio comparison. The HomeRF Shared Wireless Access Protocol (SWAP) system is designed to carry both voice and data traffic and to inter-operate with the Public Switched Telephone Network (PSTN) and the Internet. The SWAP system can operate either as an ad-hoc network or as a managed network under the control of Connection Point. Connection Point is required to coordinate the system. In an ad-hoc network that supports only data communication all stations are equal and control of network is distributed between the stations. The range covers typical home and yard. Therefore especially different consumer electronic devices use SWAP. Infrared Data Assosiation s IrDA is based on technology similar to the remote control devices such as TV and entertainment used in most home today. IrDA Data is recommended for high-speed short range, point-to-point cordless data transfer. IrDA Control is recommended in-room cordless peripherals to host-pc. The range of physical IrDA Data signaling for continuous operations is from contact to at least 1 meter, but also 2 meters can normally be reached. The range of physical IrDA Control signaling is minimum 5 meter between infrared remote control units. Infrared has advantage over radio because of the maturity of infrared technology and standardization activities. The line-of-sight requirement of infrared restricts its flexibility and is clearly disadvantage. Bluetooth is a recently proposed standard for local wireless communication of devices. It promises a variety of improvements over current functionality (hands-free communication and effortless synchronization). It allows communication between portable and fixed devices by using short-range wireless methods. These wireless local

4 4(12) area networks can be of permanent or temporary nature. Bluetooth can be used in mobile devices like mobile computers, mobile phones, network access points printers and virtually any other device that can have Bluetooth radios integrated into them. More detailed information in the context of security is given in chapter Security issues in ad-hoc Network Ad-hoc networks have same security issues as infrastructure networks. The emphases on these issues just differ from those of more conventional systems. These issues are denial of service, the goals of authentication and the problem of naming. The denial of service is a part of the availability of a service. The goals of authentication have to be set differently. This includes also naming. These issues are handled in chapter 3.2. In this chapter the master device, later only master, is the one that have a control over other devices called slaves. There can mostly be seven slaves to be controlled by one master. And a master can be a slave of another master [1]. 3.1 Availability Availability means that the service is offered to the user when it is requested. The nondelivery of a service has a great meaning to user. The denial of a service can be caused by such legitimate ways as a radio jamming or battery exhaustion. An attacker can cause a radio jamming by jamming a wider frequency band and in that way using more power. The latter can be of real threat, because once a battery runs out the attacker can walk away and leave the victim disabled. This kind of technique is called as the sleep deprivation torture attack [1]. 3.2 Authenticity From the security point of view the ad-hoc network has a fundamental problem: there are no online servers [1] [2]. A centralized administrator takes usually care of authorization mechanism. The interaction with the administrator can be expensive and time-consuming. The mechanism can anyway be implemented by access control lists or capabilities like signed certificates. The length of valid period concerning access control lists and capabilities has influence on convenience. Some trade-off between them has to be made. Stajano and Anderson [1] have presented The resurrecting duckling security policy, in which they emphasize uniqueness of a master. In this paper a slave has two exclusive states: imprinted and imprintable. The master controls his slave and they are bound to

5 5(12) together with a shared secret that is originally transferred from master to slave over a nonwireless, confidential and integrated, channel. The slave is imprinted and made imprintable by his master. The slave becomes imprintable as a consequence of conclusion of a transaction or by an order of his master. An example of this policy is the usage of a thermometer. The thermometer is calibrated once in six months. A doctor picks up any valid thermometer and wants it to communicate with e.g. her palmtop in order to receive the measured result. After this action the thermometer is free to be used by any other doctor. The original The resurrecting duckling security policy was extended to cover also a peer-to-peer interaction [9]. In the extension a master can also be a human in addition to devices. In case of human master he can imprint the slave device by typing a PIN. A master can also be a millimeter-sized dust mote of which a system is consist of. There are a lot of dust motes in monitored area and each of them has battery, solar cell, sensors and some digital computing equipment. It may also have an active transmitter and receiver. These can be used in military purpose. Another feature of this extension is that the master does not have to be unique. The slave can be imprinted also by another master that has a credential valid to that slave at the moment. The slave has a principle master, but it can receive some kind of orders also from other masters. In extension of the resurrecting duckling model the master can upload a new policy in slave, too. The key agreement is of significant importance when a secure transient association is to be guaranteed [2]. This will happen best when the key management is done locally. In case of ad-hoc network the location is more relevant as the name space. In order to implement location-based key agreement successfully a set of labels to map the location as well as identity-based mechanism for key agreement is needed. Yet there are problems that have to be solved. First, there might be multilevel certificate hierarchy and second, the sent certificate can be cancelled. In order to tackle these problems a physically secure channel or a trusted 3 rd party can be used if only it is available. A generic protocol for password authenticated key exchange is presented in figure 1 [2]. The two parties M and S share a weak secret P. The goal of this protocol is to agree a strong session key K in spite of weak P. In first step a master sends his identifier and an encrypted weak secret to slave. In second step the slave extracts E M and generates R randomly. R is encrypted with E M and returned back to master. In third step the R is extracted and challenge M and S M are generated. They are encrypted by R and sent back to slave. In forth step slave extracts challenge M and computes h(challenge M). Slaves own random strings challenge S and S S are generated and encrypted with h(challenge M) using R as a key. These will be sent back to master that in fifth step verifies the given h(challenge M) to be what it is claimed to be. The master can be convinced that slave can extract challenge M. This is possible only if the slave knows the used weak secret. The protocol can be extended to multi-party protocol. In that case S functions are also used to generate strong session key K. Other parties knowledge of K have to be confirmed.

6 6(12) Figure 1: Protocol for password authenticated key exchange. 3.3 Integrity Integrity is close to authenticity. By the integrity is meant that no node has been maliciously changed [1]. In case of integrity there are similarities between that of ad-hoc network and that of more conventional systems. Integrity has to be preserved. As certificate and identities are not secret, it is possible to clone a device. By securing the public key and letting only the device to know his private key it is possible to use the certificate in sensible way. The device has to be tamper-proof, so that his private key cannot be read out and used in a fake device. To best way to avoid attacks is to try to make the node tamper-proof, which is not simple at all. Anderson [11] has in his paper Tamper Resistance a Cautionary Note stated the importance and necessity of design security systems more carefully. The systems have to be tested also against hostile attackers. The physical tamper-evidence mechanisms are often more suitable. The tampering itself can be more than changing a code or key. It can also be a direct attack to a device. The software has to be able to be uploaded into nodes. This has to be possible also after deployment. If a part of the core code of the node is tamper-proof uploading an infiltrating of malicious code can be done.

7 7(12) 3.4 Confidentiality It is essential that the right master will be ensured as a first action. If this is left undone, there is no point to secure the communication with an arbitrary master. So when the authenticity is done properly the confidentiality is taken care by encrypting. 3.5 Privacy Ad-hoc networks have a higher tendency to eavesdropping than more conventional ones. Specially, if the key agreement is not done with a suitable protocol, anyone can listen it and determine the information needed for authentication. 4. An example of an ad-hoc network: Bluetooth The Bluetooth technology provides peer-to-peer communications for both mobile and fixed devices that use short-range wireless networks [6] [7] [8]. These transmissions can take place in a business and home environment. Bluetooth can form both permanent and temporary wireless local area networks. The signal interference is avoided by frequency hopping spread spectrum. The Bluetooth system is also a cost-effective solution, because it operates in the 2.4 Ghz ISM (Industrial, Scientific and Medical) radio frequency band that is license free in almost every country. It doesn t consume much power and there can be several access points in the same area. The basic objectives for security were to provide means for a secure link layer. From the authentication of entities point of view this means that the devices have to be identified and access control has to be solved. From the link s point of view enabling privacy in multi-access channel was an objective, but not an easy one, because eavesdropping is easy. What the Bluetooth does not do is securing end-to-end links. As Bluetooth specification 1.0 B was published just year ago, it consists of some shortcomings in security. These weaknesses concern attacks to determine the key exchange of two victim devices and attacks on location some to mention. In the following subchapters security weaknesses of Bluetooth are being presented. 4.1 Architectural overview The architectural overview of Bluetooth is presented in figure 2. In order to guarantee the confidentiality the system has to provide security measures both at the application layer and the link layer. This means that the authentication and the encryption routines have to

8 8(12) be implemented in same way in each Bluetooth device. There are four different entities used for maintaining the security at the link layer. First one of them is a Bluetooth device address which is unique for each user, but it is not a secured identity. Its size is 48 bits. The second one of them is a private user key, which is used for authentication. Its size is 128 bits. The third one of them is a private user key that is used for encryption. Its size varies from 8 to 128 bits. The authentication key is different from encryption key although the latter is created from the former one. The fourth entity is a random number, which can be derived from random or pseudo-random process in the Bluetooth device. This number will change frequently. Figure 2: Architectural overview. 4.2 Key types The link key is a 128-bit random number that is shared between two or more parties [6]. It is used in the authentication routine. It is one of the parameters when the encryption key is derived. The hierarchy of key types is presented in figure 3. The link key is either temporary or semi-permanent. The lifetime of a temporary key is same as the lifetime of a session. In a point-to-multi-point configuration, where the same information is to be distributed to several recipients, a common encryption key is useful. A special link key, here master key, can temporarily replace the current link keys. With master s random number and master key the slaves can generate a new encryption key.

9 9(12) Figure 3: Key types. When the link key is semi-permanent, it may be used several times. The combination key and the unit key are functionally indistinguishable for the device. They are just generated differently. The unit key is generated in a single device. It is done only once at the installation of the device and therefore changes rarely. The combination key is derived from information of two devices and is always dependent of those two communicating devices. It is derived for each new combination of two devices. When higher security level is wanted it is preferable to use combination key. In case device has only little memory to store keys or the device must be accessible to a large group of users it is better to use unit key [6]. The initialization key is used as a link key, when there is not yet unit key or combination key defined. It is derived from random number, a PIN code and the unique address of the claimed device. This key is used only during the initialization [6]. The encryption key is derived from the current link key. It is changed automatically whenever the encryption is activated. The other two parameter for generating a encryption key are 96-bit Ciphering Offset number (COF) and a 128-bit random number. COF is derived master s device address [6]. 4.3 Determination of key exchange The first time connection and pairing is presented in figure 4. The corresponding non-first time connection is presented in figure 5. According to the specification of Bluetooth there are two different ways of establishing the key exchange. The first protocol is used, when

10 10(12) there is not enough memory recourses in either of devices to run the second protocol. The second protocol is run unless either of devices requests for the first protocol. When using the first protocol there is only limited number of keys stored by the device. The unit key of device is used instead as a link key that is a temporary symmetric key lasting from one to several sessions. Figure 4: Link setup at first time connection. In the second protocol the link key is selected from the unit keys. Two devices select their own initialization keys and these are to functions as an address of either one. In addition to that a PIN and a random number for each device are needed. The link key will be computed as a function of those two random numbers. Figure 5: Link setup for non-first time connections. By listening the channel attacker, who is able to eavesdrop, can determine the initialization key and compute the link key. Link keys are the basis of encryption keys, so this enables attacker to impersonate devices, read s etc. These situations can be avoided by lengthening the PIN and protecting the unit keys by choosing large enough set

11 11(12) of keys. One should also defend itself against middle-person attacks both in application layer and deploying policies against them. 4.4 Location attack According to assumption the attacker has Bluetooth-enabled devices over a city. The attacker tries to initiate the communication with all reachable devices. Once a device responds the identity of that device will be recorded by an attacker. The identity of the device can also be obtained, if they respond to the communication requests of strange devices (that means attackers). In a well-chosen location e.g. airport gates a users identity can be found out by connecting obtained side information to transactions, e.g. mobile paying and subscriber. The means to avoid a location attack is to use pseudonyms at the time of the first key exchange or right after the communication is initialized. 5. Conclusion The ad-hoc networks have no or only little support infrastructure and therefore they are of a special nature. This makes different aspects of security more important than in more conventional systems. The goals of authentication and the problems of naming and location are important issues in ad-hoc networks. The resurrecting duckling security policy with the key agreement in ad-hoc networks is a good solution for ad-hoc networks in general [1][2][9]. The problem is, how to establish a connection at the first time, when there is no shared secret known by other devices. An interesting standard of Bluetooth has its shortcomings in the area of security. It does not guarantee end-to-end security, but the security at the link layer is given. Using the first protocol is not preferable at all. Also the high probability of location attack makes it wonder if this technology is mature enough to be used. Especially, when money transactions are made and transactions concerning somebody s life is depending on it, the usage of this technology is not the best one. The usage of unlicensed spectrum of ISM does not speak for itself although it has a great and advantages influence in price. To the Bluetooth is set ambitious target to win a gold medal in Europe. Time will show if this target will be achieved and when will it happen.

12 12(12) 6. References [1] Frank Stajano, Ross Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7 th International Workshop on Security Protocols, Lecture Notes in Computer Science. Springler-Verlag, Berlin, Germany, April Available from [2] N. Asokan, Philip Ginzboorg. Key agreement in ad hoc networks. Computer Communications 23 (2000) [3] Frazer Bennett, David Clarke, Joseph B. Evans, Andy Hopper, Alan Jones, David Leask. Piconet: Embedded Mobile Networking. IEEE Personal Communications, 4(5):8-15, October [4] HomeRF Working Group. [5] Infrared Data Association. [6] Specification of the Bluetooth System, specification Volume 1, v.1.0 B, December 1, See [8]. [7] Specification of the Bluetooth System, specification Volume 2, v.1.0 B, December 1, See [8]. [8] Bluetooth SIG. [9] Frank Stajano. The resurrecting duckling What next?. In Proceedings of the 8 th International Workshop on Security Protocols, Lecture Notes in Computer Science. Springler-Verlag, Berlin, Germany, April Available from [10] Markus Jakobsson, Susanne Wetzel. Personal communication. [11] Ross Anderson and Markus Kuhn. \Tamper Resistance - A Cautionary Note". In Proc. 2nd USENIX Workshop on Electronic Commerce", ISBN [12] The Wireless LAN Alliance: The IEEE Wireless LAN Standard.

Bluetooth. March 28, 2005 Patrick Lui

Bluetooth. March 28, 2005 Patrick Lui Bluetooth March 28, 2005 Patrick Lui 0053252 1. Introduction As our everyday lives move closer towards complete digital age, connectivity between devices is an important aspect that has not been emphasized

More information

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

Bluetooth. Quote of the Day. I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002 Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),

More information

WIRELESS SENSOR NETWORK

WIRELESS SENSOR NETWORK 1 WIRELESS SENSOR NETWORK Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of Technology Roorkee)

More information

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014. Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic

More information

By FaaDoOEngineers.com

By FaaDoOEngineers.com ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless

More information

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology SE 4C03 Winter 2005 Bluetooth Wireless Network Technology Researcher: Daren Tan Shen Hau Last Revised: April 4, 2005 Bluetooth As everyone will ask, what is Bluetooth? Bluetooth is a new technology that

More information

Research on Modern Bluetooth Technology

Research on Modern Bluetooth Technology Research on Modern Bluetooth Technology D.Annal 1, T.Indira 2, K.Poojitha 3, R.Rajashree 4 Student, Dept. of CSE, Magna College of Engineering, Chennai, Tamil Nadu, India 1,2,3,4 ABSTRACT: The seemingly

More information

Wireless Personal Area Networks & Wide Area Networks

Wireless Personal Area Networks & Wide Area Networks Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks

More information

ON SECURITY OF BLUETOOTH WIRELESS SYSTEM. Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica

ON SECURITY OF BLUETOOTH WIRELESS SYSTEM. Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica ON SECURITY OF BLUETOOTH WIRELESS SYSTEM Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica Brno University of Technology Faculty of Electrical Engineering and Communication Department of Control

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional

More information

Security Overview of Bluetooth

Security Overview of Bluetooth Security Overview of Bluetooth Dave Singelée, Bart Preneel COSIC Internal Report June, 2004 Abstract In this paper, we give a short overview of the security architecture of Bluetooth. We will especially

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

Wireless Security Security problems in Wireless Networks

Wireless Security Security problems in Wireless Networks Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security

More information

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS 3 WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of

More information

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the Bluetooth technology, developed by Ericsson Mobile Communications, a worldwide telecommunications company based in Sweden, is fast becoming the worldwide standard for short-range wireless communication.

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

Securing A Bluetooth Device

Securing A Bluetooth Device Securing A Bluetooth Device Mrs. Dhanashri D. Dhokate 1, Mr. Milind C. Butale 2, Mr. Babasaheb S. Patil 3 Assistant Professor, Information Technology, PVPIT, Budhgaon, India 1. Associate Professor, Electronics

More information

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

White Paper. Defining the Future of Multi-Gigabit Wireless Communications. July 2010

White Paper. Defining the Future of Multi-Gigabit Wireless Communications. July 2010 White Paper Defining the Future of Multi-Gigabit Wireless Communications July 2010 2 Introduction The widespread availability and use of digital multimedia content has created a need for faster wireless

More information

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group

More information

Security of Wireless Networks in Intelligent Vehicle Systems

Security of Wireless Networks in Intelligent Vehicle Systems Security of Wireless Networks in Intelligent Vehicle Systems Syed M. Mahmud and Shobhit Shanker Electrical and Computer Engg. Dept. Wayne State University Detroit, MI 48202 Email: smahmud@eng.wayne.edu

More information

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1 1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802. Information Technology Mobile Computing Module: Wireless Local Area Network: IEEE 802.11 Learning Objectives Introduction to Wireless Local Area Network Advantages of WLAN Types of WLAN IEEE 802.11 standards

More information

Jeffrey Price Dr. Konak IST 220 Bluetooth Technology

Jeffrey Price Dr. Konak IST 220 Bluetooth Technology Jeffrey Price Dr. Konak IST 220 Bluetooth Technology 1 TABLE OF CONTENTS 1. INTRODUCTION 2. COMPONENTS 3. BLUETOOTH ADVANTAGES/DISADVANTAGES 4. USES OF BLUETOOTH 5. THE FUTURE 7. DOCUMENTATION 2 1. INTRODUCTION

More information

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY] 2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols

More information

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Chapter 7. Basic Wireless Concepts and Configuration. Part I Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 1 Introduction to Wireless Communications Jorge Olenewa jolenewa@georgebrown.ca Office: E425 ext. 6809 Objectives Explain how the major wireless technologies

More information

Feature. What exactly is WLAN? More reading:

Feature. What exactly is WLAN? More reading: The WLAN Roadmap Wireless Local Area Networking (WLAN) is a simple concept, but one that entails a wide, sometimes confusing, variety of standards, implementations, and future plans for development. This

More information

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms

More information

Secure Initial Configuration of Resource Constrained Wireless Smart Objects

Secure Initial Configuration of Resource Constrained Wireless Smart Objects 1 Secure Initial Configuration of Resource Constrained Wireless Smart Objects Colin P. O Flynn IEEE Member. coflynn@ieee.org Abstract A lack of universal initial configuration (or bootstrapping) of low-cost

More information

Wireless LAN. Access Point. Provides network connectivity over wireless media

Wireless LAN. Access Point. Provides network connectivity over wireless media LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless

More information

A Study Wireless Communication Domain

A Study Wireless Communication Domain A Study Wireless Communication Domain Sangram Routray 1, Sanjib k. Nayak 2 Lalit M. Satapathy 1 1 Department of Electronics and Communication Engg. KIST,Bhubaneswar 2 Department of Computer science and

More information

CEN 538 Wireless LAN & MAN Networks

CEN 538 Wireless LAN & MAN Networks King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book

More information

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018 White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com

More information

Models of Authentications in Ad Hoc Networks and Their Related Network Properties

Models of Authentications in Ad Hoc Networks and Their Related Network Properties Models of Authentications in Ad Hoc Networks and Their Related Network Properties Katrin Hoeper and Guang Gong {khoeper, ggong}@calliope.uwaterloo.ca Department of Electrical and Computer Engineering University

More information

Amarjeet Singh. February 7, 2012

Amarjeet Singh. February 7, 2012 Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website

More information

Case study of Wireless Technologies in Industrial Applications

Case study of Wireless Technologies in Industrial Applications International Journal of Scientific and Research Publications, Volume 7, Issue 1, January 2017 257 Case study of Wireless Technologies in Industrial Applications Rahul Hanumanth Rao Computer Information

More information

Security. Nelli Gordon and Sean Vakili May 10 th 2011

Security. Nelli Gordon and Sean Vakili May 10 th 2011 Security Nelli Gordon and Sean Vakili May 10 th 2011 What is Bluetooth? Bluetooth is an open standard for short-range radio frequency (RF) communication. Bluetooth technology is used primarily to establish

More information

Overview of IEEE b Security

Overview of IEEE b Security Overview of IEEE 802.11b Security Sultan Weatherspoon, Network Communications Group, Intel Corporation Index words: 802.11b, wireless, WLAN, encryption, security ABSTRACT There is much regulatory and standards

More information

Computer networks for the home

Computer networks for the home Technical paper Computer networks for the home Computer networks for the home An overview This paper gives information about current and emerging technologies for networking computers in the home. It is

More information

Celestix Networks, Inc. 702 Brown Road. Fremont, California Ph Fx Introduction to Wireless Local Area Network

Celestix Networks, Inc. 702 Brown Road. Fremont, California Ph Fx Introduction to Wireless Local Area Network Introduction to Wireless Local Area Network white paper Introduction A wireless local area network (WLAN) is a flexible data communications system that can use either infrared or radio frequency (RF) technology

More information

The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings.

The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings. Samsung C6112 telephone for protection of conversations against control via a GSM service provider as well as via active and semi-active GSM interception complexes, catchers. The telephone supports 2 SIM

More information

Lecture Objectives. Lecture 1 Wireless Environment and Wireless LANs. Agenda (1) Agenda (2) Wireless Spectrum (1)

Lecture Objectives. Lecture 1 Wireless Environment and Wireless LANs. Agenda (1) Agenda (2) Wireless Spectrum (1) Lecture Objectives Wireless Networks and Mobile Systems Lecture 1 Wireless Environment and Wireless LANs Discuss the impact of the wireless environment on networks Explain the concept of spread spectrum,

More information

WIRELESS TECHNOLOGIES

WIRELESS TECHNOLOGIES WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee

More information

Digital Entertainment. Networking Made Easy

Digital Entertainment. Networking Made Easy Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 6 High Rate Wireless Personal Area Networks Objectives Define a high rate wireless personal area network (HR WPAN) List the different HR WPAN standards

More information

Wireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses

More information

Sensor Application for Museum Guidance

Sensor Application for Museum Guidance Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power

More information

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802. Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July

More information

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016 3.3 Latest Technology in Wireless Network Bluetooth Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Security in Ad Hoc Networks Attacks

Security in Ad Hoc Networks Attacks Security in Ad Hoc Networks Attacks Nie Pin niepin(at)cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks 2007-3-28 NiePin/HUT/CS/TML 1 Agenda Objectives of attacks Target selection

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

1 Wireless Network Architecture

1 Wireless Network Architecture CHAPTER 1 Wireless Network Architecture INTRODUCTION Wireless networks come in all shapes and sizes. While many aspects of these diverse networks have common foundations, there are several other aspects

More information

Attack & Defense in Wireless Networks

Attack & Defense in Wireless Networks Attack & Defense in Wireless Networks John M. Shea April 22, 2008 Overview Wireless networks fundamentals vulnerabilities WING testbed Demonstration of Denial-of-Service Attack and Defense Classification:

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

Ad Hoc & Sensor Networks

Ad Hoc & Sensor Networks Ad Hoc & Sensor Networks Advanced Topics in Computer Networks Introduction Ad Hoc & Sensor Networks Ad Hoc Networks Sensor Networks Security Concerns 1 Introduction Introduction Definitions (ad hoc?) Ad

More information

Demonstration of Remote Wireless Access to a Database for Communicating Water Quality Data

Demonstration of Remote Wireless Access to a Database for Communicating Water Quality Data Demonstration of Remote Wireless Access to a Database for Communicating Water Quality Data Theodore G. Cleveland, Ph.D.,P.E. Matthew T. Smith Civil and Environmental Engineering University of Houston September

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Key establishment in sensor networks

Key establishment in sensor networks Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks

More information

A Seminar Report On Bluetooth Technology

A Seminar Report On Bluetooth Technology A Seminar Report On Bluetooth Technology Submitted By Sanjay Dudani Roll No. - 419 Under The Guidance of Prof. P.B. Dehenkar Seminar On Bluetooth Technology (Professional Practices IV) Page 1 Bluetooth

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Wireless Sensor Networks CS742

Wireless Sensor Networks CS742 Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture

More information

3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter

3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter DATA SHEET 3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter Key Benefits Simplicity Bluetooth Connection Manager provides automatic discovery and point-and-click management of devices,

More information

Bikash Sadhukhan. M.Tech(CSE) Lecturer. Dept of CSE/IT Techno India College of Technology

Bikash Sadhukhan. M.Tech(CSE) Lecturer. Dept of CSE/IT Techno India College of Technology Bikash Sadhukhan. M.Tech(CSE) Lecturer. Dept of CSE/IT Techno India College of Technology Mobile Communication Entails transmission of data to and from handheld devices Two or more communicating devices

More information

54M Wireless LAN CardBus Card

54M Wireless LAN CardBus Card 54M Wireless LAN CardBus Card User s Manual Ver.2.0 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device,

More information

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

Wireless standards--home automation, energy, care and security

Wireless standards--home automation, energy, care and security Wireless standards--home automation, energy, care and security Rene Kohlmann - October 30, 2013 Exceptional changes are underway in the home networking market and a wide range of home systems. Everything

More information

PM0257. BlueNRG-1, BlueNRG-2 BLE stack v2.x programming guidelines. Programming manual. Introduction

PM0257. BlueNRG-1, BlueNRG-2 BLE stack v2.x programming guidelines. Programming manual. Introduction Programming manual BlueNRG-1, BlueNRG-2 BLE stack v2.x programming guidelines Introduction The main purpose of this document is to provide a developer with some reference programming guidelines about how

More information

Networks and Telecommunication

Networks and Telecommunication Networks and Telecommunication Assignment R. C. A. Wijeratne 07/AS/CI/032 EP594 WI-Fi Technology Introduction Wi-Fi is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi,

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office Operating System Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office Microsoft Corporation Published: December 2004 Update: May 2005 Abstract Because small office/home

More information

Chapter 10: Wireless LAN & VLANs

Chapter 10: Wireless LAN & VLANs Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1

More information

Managing Rogue Devices

Managing Rogue Devices Finding Feature Information, page 1 Information About Rogue Devices, page 1 How to Configure Rogue Detection, page 6 Monitoring Rogue Detection, page 8 Examples: Rogue Detection Configuration, page 9 Additional

More information

101seminartopics.com. Bluetooth Based Smart Sensor Networks

101seminartopics.com. Bluetooth Based Smart Sensor Networks Bluetooth Based Smart Sensor Networks ABSTRACT Dragging the world towards wireless galaxy Various sensors are already in a broad use today as part of different devices or as standalone devices connected

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

USB Wireless Network Adapter User s Manual

USB Wireless Network Adapter User s Manual USB Wireless Network Adapter User s Manual Rev 0.9 Regulatory compliance FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

Access Connections 5.1 for Windows Vista: User Guide

Access Connections 5.1 for Windows Vista: User Guide Access Connections 5.1 for Windows Vista: User Guide Access Connections 5.1 for Windows Vista: User Guide Note Before using this information and the product it supports, read the general information in

More information

WIMAX. WIMAX (Worldwide Interoperability for Microwave Access ): Field of application:

WIMAX. WIMAX (Worldwide Interoperability for Microwave Access ): Field of application: WIMAX WiMAX (Worldwide Interoperability for Microwave Access) is a technology that focuses on providing data over long distances in a wireless mode, very similar to the cellular mobile concept. WiMAX is

More information

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels Network Security - ISA 656 Voice Over IP (VoIP) Security Simple SIP ing Alice s Bob Session Initiation Protocol Control channel for Voice over IP (Other control channel protocols exist, notably H.323 and

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

802 Wireless Access Techniques Overview

802 Wireless Access Techniques Overview 802 Wireless Access Techniques Overview Markku Renfors Institute of Communications Engineering Tampere University of Technology TLT-6556 15.2.2007/MR 1 Wireless Access Techniques WLAN,, Wireless Local

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information