Filters








164,327 Hits in 3.3 sec

Wireless Network Security [chapter]

2006 Essential Computer Security  
Wireless networking is inherently insecure.  ...  Making MITM attacks infeasible on communication networks, is one the harder problems in network security.  ...  Security in Cellular networks The security of cellular networks has been studied, but not as rigorously as other forms of wireless networks.  ... 
doi:10.1016/b978-159749114-3/50015-2 fatcat:rnmfyo7vdrcb7i724syfryt7vm

Wireless Network Security [chapter]

2003 Network Perimeter Security  
Wireless networking is inherently insecure.  ...  Making MITM attacks infeasible on communication networks, is one the harder problems in network security.  ...  Security in Cellular networks The security of cellular networks has been studied, but not as rigorously as other forms of wireless networks.  ... 
doi:10.1201/9780203508046.ch11 fatcat:pabvqxrbcrcjhc2dix3akt4g4m

Wireless Network Security [chapter]

2009 Computer Network Security  
Wireless networking is inherently insecure.  ...  Making MITM attacks infeasible on communication networks, is one the harder problems in network security.  ...  Security in Cellular networks The security of cellular networks has been studied, but not as rigorously as other forms of wireless networks.  ... 
doi:10.1007/978-3-540-79698-5_6 fatcat:bhvfii5tnjfr7gfrtr3c5nbbke

Wireless Network Security

Yang Xiao, Yi-Bing Lin, Ding-Zhu Du
2006 EURASIP Journal on Wireless Communications and Networking  
However, wireless network security is a major obstacle to successfully deploy these wireless networks.  ...  Recent advances in wireless network technologies are growing fast, evidenced by wireless location area networks (WL-ANs), wireless personal area network (WPANs), wireless metropolitan area networks (WMANs  ...  area networks (WWANs), that is, cellular networks. However, wireless network security is a major obstacle to successfully deploy these wireless networks.  ... 
doi:10.1155/wcn/2006/48374 fatcat:3y24rf56tzbshi2ic2pi4ueloy

Wireless Network Security [chapter]

2016 Introduction to Network Security  
Wireless networking is inherently insecure.  ...  Making MITM attacks infeasible on communication networks, is one the harder problems in network security.  ...  Security in Cellular networks The security of cellular networks has been studied, but not as rigorously as other forms of wireless networks.  ... 
doi:10.1002/9781119113102.ch6 fatcat:z5p7vijp3va2fla3rinr3s3pq4

Wireless Network Security

Yang Xiao, Hui Chen, Shuhui Yang, Yi-Bing Lin, Ding-Zhu Du
2009 EURASIP Journal on Wireless Communications and Networking  
Wireless networks pose a unique challenge in computer and network security community.  ...  The effort to improve wireless network security is linked with many technical challenges including compatibility with legacy wireless networks, complexity in implementation, and practical values in the  ...  Wireless networks pose a unique challenge in computer and network security community.  ... 
doi:10.1155/2009/532434 fatcat:pfdl7bep3vcxjj3ednxlssuzji

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
Challenges Wireless sensor networks inherit security problems from wireless networks and introduce far more challenges towards design of efficient key management solutions.  ...  of wireless sensor network IDS.  ...  The standards for network applications and services are maturing and new specifications in security systems are being defined.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Mobile Wireless Network Security [chapter]

Michel Barbeau
2012 Handbook on Securing Cyber-Physical Critical Infrastructure  
Key can be obtained by XOR-ing random val. and its encrypted form Networks o Specific Threats o Specific Methods of Attack Wireless Security o Security and Security Flaws in 802.11 o WEP Replacements  ...  Contents Insecurity of Mobile and Wireless Security in Bluetooth The Official Bluetooth Website, Specification of the Bluetooth System, Specification Volume 1, Version 1.1, Chapter 14, February 22  ... 
doi:10.1016/b978-0-12-415815-3.00005-4 fatcat:ttebydcyrjdhxgyymqczb2xxsa

Wireless Sensor Network Security [chapter]

Saurabh Sharma, Amit Sahu, Ashok Verma, Neeraj Shukla
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The main characteristics of a WSN include: § Power consumption constrains for nodes using batteries or energy harvesting § Ability to cope with node failures § Mobility of nodes § Dynamic network topology  ...  CONCLUSION Security in Wireless Sensor Network is vital to the acceptance and use of sensor networks.  ...  In particular, Wireless Sensor Network product in industry will not get acceptance unless there is a fool proof security to the network.  ... 
doi:10.1007/978-3-642-27317-9_33 fatcat:kf3nwddoajez5ad6mngk2ong6i

Securing wireless mesh networks

N.B. Salem, J.-P. Hubaux
2006 IEEE wireless communications  
Using Wireless Mesh Networks (WMNs) to offer Internet connectivity is becoming a popular choice for Wireless Internet Service Providers as it allows a fast, easy and inexpensive network deployment.  ...  In this paper, we describe the specifics of WMNs and we identify three fundamental network operations that need to be secured.  ...  Introduction Wireless Mesh Networks (WMNs) represent a good solution to providing wireless Internet connectivity in a sizable geographic area; this new and promising paradigm allows for network deployment  ... 
doi:10.1109/mwc.2006.1632480 fatcat:cfh5ax4d3jgftlc7usj3kqgoxi

Securing Wireless Mesh Networks

Steve Glass, Marius Portmann, Vallipuram Muthukkumarasamy
2008 IEEE Internet Computing  
Now found in domestic, commercial, industrial, military, and healthcare applications, wireless networks are becoming ubiquitous.  ...  In this article, the authors consider the problem of ensuring security in WMNs, introduce the IEEE 802.11s draft standard, and discuss the open security threats faced at the network and data-link layers  ...  An ad- • • • • Securing Wireless Mesh Networks versary might be able to physically capture a station, which presents risks not frequently experienced with an infrastructure network.  ... 
doi:10.1109/mic.2008.85 fatcat:ancmy2e7wnbmbn2xpb7oon3fia

Securing Wireless Sensor Networks: Security Architectures

David Boyle, Thomas Newe
2008 Journal of Networks  
Resulting from the continuous debate over the most effective means of securing wireless sensor networks, this paper considers a number of the security architectures employed, and proposed, to date, with  ...  Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks.  ...  many attacks to the security of wireless sensor networks [39] .  ... 
doi:10.4304/jnw.3.1.65-77 fatcat:djmrfoyxvfg7bcflboxqcuvtce

Securing a wireless network

Jon Allen, Jeff Wilson
2002 Proceedings of the 30th annual ACM SIGUCCS conference on User services - SIGUCCS '02  
Common methods of securing wireless networks include WEP, VPN, MAC registration, IEEE 802.1x, and Firewalls.  ...  Driven by pressure to facilitate mobile computing, universities are plunging into wireless networking.  ...  CONCLUSION Wireless networks pose unique challenges for network and security administrators.  ... 
doi:10.1145/588646.588696 dblp:conf/siguccs/AllenW02 fatcat:faqhak64ajb5xnsaslc2sus3da

Wireless Network Security Fundamentals and Technologies

2017 International Journal of Recent Trends in Engineering and Research  
In this paper we will discuss few of the security technologies developed to provide security for wireless networks.  ...  With increasing deployment of wireless networks, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks.  ...  WIRELESS NETWORK SECURITY TECHNOLOGIES Vendors are doing a good job of improving security features, and users are getting an understanding of wireless security.  ... 
doi:10.23883/ijrter.2017.3167.inazm fatcat:kvletcsjj5bcfbd3cfiouiiczy

Security in Wireless Local Area Networks

2018 International Journal of Recent Trends in Engineering and Research  
Wireless Local Area Networks. The WLANs nowadays provide unlimited broadband usage to users that have been previously offered simply to wireline users within a limited range.  ...  Security Among the prime concerns in wireless networking is security.  ...  WMAN: Wireless Metropolitan Area Network; generally cover wider areas as huge as entire cities. WWAN: Wireless Wide Area Network that has a cell radius about 50 km, cover areas bigger a city.  ... 
doi:10.23883/ijrter.2018.4239.7gdzd fatcat:me5qyu5qtjbetogecbklxevfuu
« Previous Showing results 1 — 15 out of 164,327 results