mobile & wireless network security & privacy

232 698 0
mobile & wireless network security & privacy

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... existing networks, wireless and wired Any networking research that the NSF supports on new classes of wireless networks should be complemented with security research that addresses these threats There is no point in repeating the mistakes made in securing 802.11 networks, and great value in learning from the good examples of designing security into 3G technologies Security and Privacy for Mobile and Wireless. .. particular wireless device changes frequently For the purpose of this report, we care about the privacy and security challenges of these networks only However, it is worth noting that it is Security and Privacy for Mobile and Wireless Networks 13 unclear whether the basic networking challenges of these types of networks have been sufficiently solved to make them generally attractive, regardless of security. .. deliberations of the mobile and wireless security experts who participated in the 2006 Workshop on Security and Privacy in Wireless and Mobile Networks (WSPWN), held in Miami, Florida in March 2006 The goal of that workshop was to offer expert guidance to the National Science Foundation on priorities in research directions in the fields of privacy and security for today and tomorrow’s wireless mobile environments... as cryptography and key management, routing security, location security, data fusion security, and security maintenance Security and Privacy for Mobile and Wireless Networks 11 • Cryptographic concerns that are particularly important for sensor nets include the processing and power costs of performing cryptography, complexity of the algorithms (since sensor network nodes often have limited memory to... caused by particulars of the protocols specified in these standards A wireless network uses signals such as light or radio waves to provide connection among the different devices such as computers, phones, etc Therefore, wireless networks share airwaves with each other, and the radio Security and Privacy for Mobile and Wireless Networks 7 signals typically travel in all directions Technologies using... interesting security opportunities based on their unique characteristics 1.3.3 Challenges for mesh and ad hoc networks Mesh and ad hoc networks offer the possibility of providing networking without the kind of infrastructure typically required either by wired networking or base-station oriented wireless networking Instead, a group of wireless- equipped devices are organized into a multihop network to... number of security measures were built into the 802.11 standard, such as the Wired Equivalent Privacy protocol (WEP) and Wi-Fi Protected Access (WPA), it is almost universally accepted that wireless networks are considerably less secure than wired ones Some of the problems leading to such insecurity are inherent in the very idea of wireless networking, some are specific to the style of wireless networking... their internal benefit To solidify these recommendations, we recommend that the National Science Foundation prioritize research funding for privacy and security in the mobile and wireless environments in the following ways: Security and Privacy for Mobile and Wireless Networks 21 a) Fund projects that offer good possibilities to solve problems that have been observed in real world situations and for which... network protocols and designs has been developed for sensor networks They do not have the same capabilities, needs, or purposes as a typical networked computer, even a typical computer that uses wireless networking As a result, security solutions developed for the Internet, wireless LANs, or other more standard purposes are often either unusable or irrelevant for sensor networks The use of sensor networks... existing algorithms into Security and Privacy for Mobile and Wireless Networks 5 low powered variants with little or no loss of security, although some recent results on “light” cryptography are promising Cryptography also has something to offer for mobile devices The rash of recent cases of lost or stolen laptops and flash drives holding sensitive information should have taught security- aware users that . alt="" Mobile and Wireless Network Security and Privacy Edited by S. Kami Makki Peter Reiher Kia Makki Niki Pissinou Shamila Makki Mobile and Wireless Network Security and Privacy. Related Work in Privacy and Security 96 5.4.1 Privacy and security solutions in pervasive computing 96 5.4.2 Privacy and security solutions in ambient networks 97 5.4.3 Privacy and security solutions. Directions in Security and Privacy for Mobile and Wireless Networks 1 1.1 Introduction 1 1.2 The State of the Art 4 1.3 Areas for Future Research 6 1.3.1 Challenges for standard wireless networks

Ngày đăng: 25/03/2014, 11:51

Từ khóa liên quan

Mục lục

  • Cover

  • Front

  • Contents

  • Preface

  • 1 Research Directions in Security and Privacy for Mobile and Wireless Networks.pdf

  • 2 Pervasive Systems_ Enhancing Trust Negotiation with Privacy Support.pdf

  • 3 Applying Trust in Mobile and Wireless Networks.pdf

  • 4 A Framework for Computing Trust in Mobile Ad-Hoc Networks.pdf

  • 5 The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security.pdf

  • 6 On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks.pdf

  • 7 Computer Ecology_ Responding to Mobile Worms with Location-Based Quarantine Boundaries.pdf

  • 8 Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions.pdf

  • 9 An Anonymous MAC Protocol for Wireless Ad-hoc Networks.pdf

  • 10 Hardware_Software Solution to Improve Security in Mobile Ad-hoc Networks.pdf

  • Index

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan