Information Technology Reference
In-Depth Information
Information storage, related to security services : a database of service
ranking the applications, before they become available, according to their
level of security.
Response to requests for access by applications or implementations of the
protocol : each time a requested data unit, or access to a particular service,
the security manager will grant or refuse the requested access, basing on
the security information of both the service and the unit.
Imposing the procedures required for encryption and/or authentication
before connecting to the application through the stack protocol.
Initialize or process the input from a user of the device to configure the
trust settings of the device.
4.3 Ad Hoc networks
An ad hoc network is a collection of wireless mobile nodes dynamically
forming a temporary network without the aid of network infrastructure or
centralized administration. All nodes are able to move and can inter-connect
in an arbitrary manner. Bluetooth technology, independent of fixed infra-
structure, from the beginning has been developed for mobile devices and, as a
result, it is able to create ad hoc networks, for this it is perfectly keeping with
the philosophy of UC. However, Bluetooth has some different characteristics
and properties that do not support some of the routing protocols of ad hoc
networks. As a matter of fact, the routing of data between the master and the
slave in a small network is a particular safety problem (Piconet). A solution
to this problem is to form a combination of keys that can be used to encrypt
traffic. The master unit generates a combination of keys with each slave,
thereafter data can be sent from a slave to all other slaves of the network,
through the master, who knows all the keys. Another approach for the
development of a secure ad hoc network is based on the master key. This
implementation requires that all devices on the network use the same key to
encrypt the traffic, eliminating the need for passage through the master.
Another major problem is that Bluetooth is a network link-oriented, where
the first operation performed is the creation of connections between devices.
On the other hand, the ad hoc networks are networks broadcast-oriented,
where the devices continuously emit radio messages and all other units are
listening and can process the received signals [11].
Certain types of routing in ad hoc networks require the location
information of a particular device. In this case, Bluetooth technology cannot
satisfy that request because it may provide information regarding only the
signal strength of a device that is communicating with another. This
information, however, can be used to provide services. Currently, the routing
of ad hoc networking with Bluetooth technology is a topic of research [11].
Search WWH ::




Custom Search