Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-94fs2 Total loading time: 0 Render date: 2024-11-08T06:30:10.603Z Has data issue: false hasContentIssue false

16 - File- and device-sharing

from Part III - Applications

Published online by Cambridge University Press:  05 December 2014

Get access

Summary

In the past ten years personal computing has become truly personal: devices such as laptops, mobile phones and tablets that might twenty years ago have been owned and administered by a corporate IT department are now owned by each employee, and Bring Your Own Device (BYOD) policies mean that personal devices are often encouraged to join the corporate network.

At the same time the home has acquired innumerable networked devices: the IT system, home entertainment, heating, automated white goods and kitchen equipment can all be linked to the home network, usually wirelessly. And even in transit from home to office, the car and public transport systems sport mobile data and WiFi networks.

Making the appropriate connections between these devices, and not allowing inappropriate connections, is now a major issue; the convenience of using a single device in every location is lost if that device cannot access the peripherals or files it needs.

Most of these connections are currently made using either WiFi or Bluetooth; Bluetooth should give adequate security for most purposes, as will WiFi provided the network is encrypted, preferably using WPA2 (WiFi Protected Access version 2). But the method of joining the network must be protected to prevent outsiders joining the secure network. Fully wireless methods are vulnerable to “sniffing” and eavesdropping attacks; using NFC to set up the link introduces a need for physical proximity, which significantly reduces those risks.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Padgette, J., Scorfone, L. and Chen, L., Guide to Bluetooth Security, NIST, June 2012
Connection Handover Technical Specification, V1.2, NFC Forum, July 2010
Vlugt, E., Bluetooth Low Energy, Beacons and Retail, VeriFone, San Jose CA, 2013Google Scholar
Website at

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • File- and device-sharing
  • Mike Hendry
  • Book: Near Field Communications Technology and Applications
  • Online publication: 05 December 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781107446854.019
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • File- and device-sharing
  • Mike Hendry
  • Book: Near Field Communications Technology and Applications
  • Online publication: 05 December 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781107446854.019
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • File- and device-sharing
  • Mike Hendry
  • Book: Near Field Communications Technology and Applications
  • Online publication: 05 December 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781107446854.019
Available formats
×