Pervasive Computing and Bluetooth

نویسنده

  • Henrik J. Asplund
چکیده

This paper discusses possibilities of Bluetooth technology in pervasive computing environments. A model that utilises JiniTM and Bluetooth is proposed. Bluetooth can be handled as a wireless LAN solution as I have done in this paper. The paper is based on somewhat practical views rather than on abstractions. I also try to give a real-life case for Bluetooth and show, how Bluetooth can be used to implement a very simple but concrete system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Implementation of Bluetooth Security

S ecurity in pervasive computing is a complex issue that has been the subject of negative publicity in recent years due to poor implementations (such as the Wired Equivalent Privacy protocol used by IEEE 802.11). Many low-level protocols are not secure, and the use of more secure high-level protocols is limited by the processing capabilities of mobile devices. Bluetooth could enhance and extend...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

Integrating Privacy Enhancing Services in Ubiquitous Computing Environments

With the advances in pervasive wireless communications (such as GSM, WaveLAN, Bluetooth, etc.) and context-aware and ‘smart room’ prototypes (GUIDE [1], AT&T’s Sentient Computing [2], Oxygen [3], Easy Living [4], the Aware Home [5], etc.), Mark Weiser’s vision of ubiquitous computing seems closer than ever to reality. However, only until such systems are widely deployed and integrated with our ...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Leveraging Bluetooth co-location traces in group discovery algorithms

Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups, which can enhance recommender systems or allow detection of epidemic events. Group discovery using Bluetooth co-location is practical due to low power consumption, short range, and applicability to decentralization. This paper presents the Group Discovery using Co-location traces ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000