Handbook of Security and Networks 2011
DOI: 10.1142/9789814273046_0001
|View full text |Cite
|
Sign up to set email alerts
|

Security in Wireless Data Networks

Abstract: This chapter illustrates the key concepts of security, wireless networks, and security over wireless networks. Wireless security is demonstrated by explaining the main specifications of the common security standards like 802.11 WEP, 802.11 WPA, WPA2 (802.11i) and Bluetooth security standards. Moreover, it explains the concept of WMAN (Wireless Metropolitan Access Network) and its security specifications. Finally, it sums up with thoughts and suggestions about wireless security, along with chosen examples of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…This key derivation scheme is highly efficient: the two hashes that are required to create a venue key can be computed in milliseconds, far faster than the time it would take for Alice to compose any amount of text to post in that venue. AES‐256 encryption is also very fast: over 48 MB/sec in C++ software on a modest Pentium processor (see, for example, a 2006 paper). Thus, the overall performance penalty for Blockchain privacy and access control is clearly negligible.…”
Section: Detailed Designmentioning
confidence: 99%
“…This key derivation scheme is highly efficient: the two hashes that are required to create a venue key can be computed in milliseconds, far faster than the time it would take for Alice to compose any amount of text to post in that venue. AES‐256 encryption is also very fast: over 48 MB/sec in C++ software on a modest Pentium processor (see, for example, a 2006 paper). Thus, the overall performance penalty for Blockchain privacy and access control is clearly negligible.…”
Section: Detailed Designmentioning
confidence: 99%
“…General class of threats are similar to those of traditional wireless networks and have been well investigated in the literature e.g. See [50] and the references therein. CRN-specific threats can be attributed to the secondary (or non-prioritized) spectrum access of the CR nodes [49].…”
Section: Security Issuesmentioning
confidence: 99%