Pervasive Computing and Bluetooth
نویسنده
چکیده
This paper discusses possibilities of Bluetooth technology in pervasive computing environments. A model that utilises JiniTM and Bluetooth is proposed. Bluetooth can be handled as a wireless LAN solution as I have done in this paper. The paper is based on somewhat practical views rather than on abstractions. I also try to give a real-life case for Bluetooth and show, how Bluetooth can be used to implement a very simple but concrete system.
منابع مشابه
Hardware Implementation of Bluetooth Security
S ecurity in pervasive computing is a complex issue that has been the subject of negative publicity in recent years due to poor implementations (such as the Wired Equivalent Privacy protocol used by IEEE 802.11). Many low-level protocols are not secure, and the use of more secure high-level protocols is limited by the processing capabilities of mobile devices. Bluetooth could enhance and extend...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملIntegrating Privacy Enhancing Services in Ubiquitous Computing Environments
With the advances in pervasive wireless communications (such as GSM, WaveLAN, Bluetooth, etc.) and context-aware and ‘smart room’ prototypes (GUIDE [1], AT&T’s Sentient Computing [2], Oxygen [3], Easy Living [4], the Aware Home [5], etc.), Mark Weiser’s vision of ubiquitous computing seems closer than ever to reality. However, only until such systems are widely deployed and integrated with our ...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملLeveraging Bluetooth co-location traces in group discovery algorithms
Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups, which can enhance recommender systems or allow detection of epidemic events. Group discovery using Bluetooth co-location is practical due to low power consumption, short range, and applicability to decentralization. This paper presents the Group Discovery using Co-location traces ...
متن کامل