A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
Wireless Network Security
[chapter]
2006
Essential Computer Security
Wireless networking is inherently insecure. ...
Making MITM attacks infeasible on communication networks, is one the harder problems in network security. ...
Security in Cellular networks The security of cellular networks has been studied, but not as rigorously as other forms of wireless networks. ...
doi:10.1016/b978-159749114-3/50015-2
fatcat:rnmfyo7vdrcb7i724syfryt7vm
Wireless Network Security
[chapter]
2003
Network Perimeter Security
Wireless networking is inherently insecure. ...
Making MITM attacks infeasible on communication networks, is one the harder problems in network security. ...
Security in Cellular networks The security of cellular networks has been studied, but not as rigorously as other forms of wireless networks. ...
doi:10.1201/9780203508046.ch11
fatcat:pabvqxrbcrcjhc2dix3akt4g4m
Wireless Network Security
[chapter]
2009
Computer Network Security
Wireless networking is inherently insecure. ...
Making MITM attacks infeasible on communication networks, is one the harder problems in network security. ...
Security in Cellular networks The security of cellular networks has been studied, but not as rigorously as other forms of wireless networks. ...
doi:10.1007/978-3-540-79698-5_6
fatcat:bhvfii5tnjfr7gfrtr3c5nbbke
Wireless Network Security
2006
EURASIP Journal on Wireless Communications and Networking
However, wireless network security is a major obstacle to successfully deploy these wireless networks. ...
Recent advances in wireless network technologies are growing fast, evidenced by wireless location area networks (WL-ANs), wireless personal area network (WPANs), wireless metropolitan area networks (WMANs ...
area networks (WWANs), that is, cellular networks. However, wireless network security is a major obstacle to successfully deploy these wireless networks. ...
doi:10.1155/wcn/2006/48374
fatcat:3y24rf56tzbshi2ic2pi4ueloy
Wireless Network Security
[chapter]
2016
Introduction to Network Security
Wireless networking is inherently insecure. ...
Making MITM attacks infeasible on communication networks, is one the harder problems in network security. ...
Security in Cellular networks The security of cellular networks has been studied, but not as rigorously as other forms of wireless networks. ...
doi:10.1002/9781119113102.ch6
fatcat:z5p7vijp3va2fla3rinr3s3pq4
Wireless Network Security
2009
EURASIP Journal on Wireless Communications and Networking
Wireless networks pose a unique challenge in computer and network security community. ...
The effort to improve wireless network security is linked with many technical challenges including compatibility with legacy wireless networks, complexity in implementation, and practical values in the ...
Wireless networks pose a unique challenge in computer and network security community. ...
doi:10.1155/2009/532434
fatcat:pfdl7bep3vcxjj3ednxlssuzji
Wireless Sensor Network Security
2013
International Journal of Distributed Sensor Networks
Challenges Wireless sensor networks inherit security problems from wireless networks and introduce far more challenges towards design of efficient key management solutions. ...
of wireless sensor network IDS. ...
The standards for network applications and services are maturing and new specifications in security systems are being defined. ...
doi:10.1155/2013/362385
fatcat:2ph46uukonbtbdkc5q6t4mvgcq
Mobile Wireless Network Security
[chapter]
2012
Handbook on Securing Cyber-Physical Critical Infrastructure
Key can be obtained by XOR-ing random val. and its encrypted form Networks
o Specific Threats
o Specific Methods of Attack
Wireless Security
o Security and Security Flaws in 802.11
o WEP Replacements ...
Contents
Insecurity of Mobile and Wireless
Security in Bluetooth The Official Bluetooth Website, Specification of the Bluetooth System, Specification Volume 1, Version 1.1, Chapter 14, February 22 ...
doi:10.1016/b978-0-12-415815-3.00005-4
fatcat:ttebydcyrjdhxgyymqczb2xxsa
Wireless Sensor Network Security
[chapter]
2012
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
The main characteristics of a WSN include: § Power consumption constrains for nodes using batteries or energy harvesting § Ability to cope with node failures § Mobility of nodes § Dynamic network topology ...
CONCLUSION Security in Wireless Sensor Network is vital to the acceptance and use of sensor networks. ...
In particular, Wireless Sensor Network product in industry will not get acceptance unless there is a fool proof security to the network. ...
doi:10.1007/978-3-642-27317-9_33
fatcat:kf3nwddoajez5ad6mngk2ong6i
Securing wireless mesh networks
2006
IEEE wireless communications
Using Wireless Mesh Networks (WMNs) to offer Internet connectivity is becoming a popular choice for Wireless Internet Service Providers as it allows a fast, easy and inexpensive network deployment. ...
In this paper, we describe the specifics of WMNs and we identify three fundamental network operations that need to be secured. ...
Introduction Wireless Mesh Networks (WMNs) represent a good solution to providing wireless Internet connectivity in a sizable geographic area; this new and promising paradigm allows for network deployment ...
doi:10.1109/mwc.2006.1632480
fatcat:cfh5ax4d3jgftlc7usj3kqgoxi
Securing Wireless Mesh Networks
2008
IEEE Internet Computing
Now found in domestic, commercial, industrial, military, and healthcare applications, wireless networks are becoming ubiquitous. ...
In this article, the authors consider the problem of ensuring security in WMNs, introduce the IEEE 802.11s draft standard, and discuss the open security threats faced at the network and data-link layers ...
An ad- • • • •
Securing Wireless Mesh Networks versary might be able to physically capture a station, which presents risks not frequently experienced with an infrastructure network. ...
doi:10.1109/mic.2008.85
fatcat:ancmy2e7wnbmbn2xpb7oon3fia
Securing Wireless Sensor Networks: Security Architectures
2008
Journal of Networks
Resulting from the continuous debate over the most effective means of securing wireless sensor networks, this paper considers a number of the security architectures employed, and proposed, to date, with ...
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. ...
many attacks to the security of wireless sensor networks [39] . ...
doi:10.4304/jnw.3.1.65-77
fatcat:djmrfoyxvfg7bcflboxqcuvtce
Securing a wireless network
2002
Proceedings of the 30th annual ACM SIGUCCS conference on User services - SIGUCCS '02
Common methods of securing wireless networks include WEP, VPN, MAC registration, IEEE 802.1x, and Firewalls. ...
Driven by pressure to facilitate mobile computing, universities are plunging into wireless networking. ...
CONCLUSION Wireless networks pose unique challenges for network and security administrators. ...
doi:10.1145/588646.588696
dblp:conf/siguccs/AllenW02
fatcat:faqhak64ajb5xnsaslc2sus3da
Wireless Network Security Fundamentals and Technologies
2017
International Journal of Recent Trends in Engineering and Research
In this paper we will discuss few of the security technologies developed to provide security for wireless networks. ...
With increasing deployment of wireless networks, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. ...
WIRELESS NETWORK SECURITY TECHNOLOGIES Vendors are doing a good job of improving security features, and users are getting an understanding of wireless security. ...
doi:10.23883/ijrter.2017.3167.inazm
fatcat:kvletcsjj5bcfbd3cfiouiiczy
Security in Wireless Local Area Networks
2018
International Journal of Recent Trends in Engineering and Research
Wireless Local Area Networks. The WLANs nowadays provide unlimited broadband usage to users that have been previously offered simply to wireline users within a limited range. ...
Security Among the prime concerns in wireless networking is security. ...
WMAN: Wireless Metropolitan Area Network; generally cover wider areas as huge as entire cities. WWAN: Wireless Wide Area Network that has a cell radius about 50 km, cover areas bigger a city. ...
doi:10.23883/ijrter.2018.4239.7gdzd
fatcat:me5qyu5qtjbetogecbklxevfuu
« Previous
Showing results 1 — 15 out of 164,327 results