Pervasive Business Infrastructure: The Network Technologies, Routing and Security Issues

Pervasive Business Infrastructure: The Network Technologies, Routing and Security Issues

Varuna Godara (University of Western Sydney, Australia)
DOI: 10.4018/978-1-60566-220-6.ch002
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The need for more and more flexibility (in terms of time and location) in business operations, contextbased services, decentralization of business processes, and information processing and innovative services has introduced new ubiquitous environments, sensing technologies, and pervasive devices. This new category of devices, sensors, and ubiquitous environments, has the capabilities to observe the users all the time using sensors; provide timely information to service providers using communication channels; and offer accurate services to users anywhere and anytime through tiny mobile terminals. This chapter provides the users of the pervasive business technologies an overview of the basic infrastructure and protocols used to form these ubiquitous wireless environments and provide context-based comfort, while taking care of confidentiality, secrecy, integrity, and authenticity. Along with an introduction to the markup languages, protocols, and security threats, the chapter concludes with the discussion of a range of common biometric, cryptographi,c and routing solutions.
Chapter Preview
Top

P-Business Infrastructure

The fundamental infrastructure of p-business is a combination of various private and public wireless networks; wired networks (including Internet); wireless sensor network (WSN); global wireless media communication standards (e.g., via satellite) and local wireless media communication standards (e.g., wireless fidelity [Wi-Fi] and i-mode network standards); short distance standards (e.g., Bluetooth and Ultra Wideband), cellular carrier specific standards (e.g., Global System for Mobile [GSM], Time Division Multiple Access [TDMA], or Code Division Multiple Access[CDMA], etc.); pervasive devices; embedded controls; software developed using Java; Operating Systems; identification hardware; software, security tools, and techniques.

Complete Chapter List

Search this Book:
Reset