Academic literature on the topic 'Wireless security networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless security networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wireless security networks"

1

Shokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Barinder Paul, Anish Arora, and Ashish Kumar. "Security in Wireless Sensor Networks." JOURNAL OF ADVANCES IN PHYSICS 1, no. 1 (October 25, 2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.

Full text
Abstract:
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
3

Hari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (December 20, 2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (January 20, 2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.

Full text
Abstract:
One of the most important types that used to transfer data between nodes without using wires is a “wireless communication network”, where the transmission of data is censored remotely by using electromagnetic waves such as radio waves that usually implemented in the physical layer of the network. Continuous improvements in wireless network technology have reduced the security and speed differences between types of networks (wired and wireless), but in turn, increased security threats to wirelessly transmitted data. Wireless networks are weak in terms of "privacy protection" because anyone who is within the coverage area of a wireless network can attempt to break into that network. Hacking incidents have been reported frequently in places with shared free networks, and it has been observed that the places of open distributed networks of the Internet are most at risk of complete penetration of your phone or PC data. To solve this problem, several programs have been developed that provide protection for wireless networks that differ in terms of security. Some of them did not provide sufficient protection for wireless networks, such as Wired Equivalent Privacy (WEP), and others made progress in preventing intrusions compared to their predecessors, such as Wi-Fi Protected Access (WPA).
APA, Harvard, Vancouver, ISO, and other styles
5

ABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (April 1, 2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.

Full text
Abstract:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, De Feng, Wen Yan Zhang, and Zhi Bin Yang. "Research and Implementation of a Wireless Network Security Inspection Platform for a Power Supply Enterprise." Applied Mechanics and Materials 602-605 (August 2014): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2134.

Full text
Abstract:
Currently, information security inspection can only be conducted via network scan using a laptop, which results in a low-efficient one-by-one check, and moreover lacks the ability to locate wireless networks and not to mention technical measures to discover hidden networks. With respect to the regulations of a power supply enterprise regarding wireless network security, combined with the operation and maintenance comprehensive supervision system (IMS), and the information extranet security monitoring system (ISS), a cascading wireless network security inspection platform is studied and implemented. This paper describes the wireless network encryption technology, and details the deployment pattern and the work flow, etc. about the wireless network security inspection platform. Experiments show that the platform provides support for the information security supervision work of wireless networks and can effectively safeguard the security of wireless networks in a power enterprise.
APA, Harvard, Vancouver, ISO, and other styles
7

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.

Full text
Abstract:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized the various security issues and security threats in WSNs and solutions. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
APA, Harvard, Vancouver, ISO, and other styles
8

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.

Full text
Abstract:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized the various security issues and security threats in WSNs and solutions. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
APA, Harvard, Vancouver, ISO, and other styles
9

Kumari, Shabnam, and Sumit Dalal. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 477–83. http://dx.doi.org/10.31142/ijtsrd12931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Prabhakar, Abhishek, Amod Tiwari, and Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (April 19, 2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.

Full text
Abstract:
Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Wireless security networks"

1

GHUMMAN, SHAKEEL AHMAD. "Security in Wireless Mesh Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4175.

Full text
Abstract:

The Master’s thesis report describes the wireless mesh networks functions,

characteristics, network management and finally different protocols with security issues and applications. Wireless Networks (WMNs) are replacing wireless Infrastructure networks in many areas because of their lower and higher flexibility. The wireless mesh networks (WMNs) provides network access for both mesh and conventional clients through mesh routers and mesh clients. Communication across the network is formed via the bridge functions. Mesh router also provides the minimal mobility and form the backbone of WMNs.

Wireless mesh network has resolved the limitation of ad hoc networks which is ultimately improves the performance of Ad hoc networks. Security is a very important issue which can be resolve through proper management of network. The improvment of 802.11i security has greatly improved the network perfomance and increase the encryption and integrity security capabilities. The key points which are being addressed in this report are security issues and threats and their counter measures. Attacks which can come on diffent layers are being discussed in this survey. Security of wireless mesh network is still under consideration. Wireless mesh network are attracting more attention due to its enhanced features.

Wireless mesh network topology technology is being discussed in this report. Then network management of WMNs is explained and in the concluding chapters security issues are discussed. Threats, attacks and challenges of WMNs are discussed in this survey.

APA, Harvard, Vancouver, ISO, and other styles
2

Jiang, Shu. "Efficient network camouflaging in wireless networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/3067.

Full text
Abstract:
Camouflaging is about making something invisible or less visible. Network camouflaging is about hiding certain traffic information (e.g. traffic pattern, traffic flow identity, etc.) from internal and external eavesdroppers such that important information cannot be deduced from it for malicious use. It is one of the most challenging security requirements to meet in computer networks. Existing camouflaging techniques such as traffic padding, MIX-net, etc., incur significant performance degradation when protected networks are wireless networks, such as sensor networks and mobile ad hoc networks. The reason is that wireless networks are typically subject to resource constraints (e.g. bandwidth, power supply) and possess some unique characteristics (e.g. broadcast, node mobility) that traditional wired networks do not possess. This necessitates developing new techniques that take account of properties of wireless networks and are able to achieve a good balance between performance and security. In this three-part dissertation we investigate techniques for providing network camouflaging services in wireless networks. In the first part, we address a specific problem in a hierarchical multi-task sensor network, i.e. hiding the links between observable traffic patterns and user interests. To solve the problem, a temporally constant traffic pattern, called cover traffic pattern, is needed. We describe two traf- fic padding schemes that implement the cover traffic pattern and provide algorithms for achieving the optimal energy efficiencies with each scheme. In the second part, we explore the design of a MIX-net based anonymity system in mobile ad hoc networks. The objective is to hide the source-destination relationship with respect to each connection. We survey existing MIX route determination algorithms that do not account for dynamic network topology changes, which may result in high packet loss rate and large packet latency. We then introduce adaptive algorithms to overcome this problem. In the third part, we explore the notion of providing anonymity support at MAC layer in wireless networks, which employs the broadcast property of wireless transmission. We design an IEEE 802.11-compliant MAC protocol that provides receiver anonymity for unicast frames and offers better reliability than pure broadcast protocol.
APA, Harvard, Vancouver, ISO, and other styles
3

Bradford, Bryan L. "Wireless security within hastily formed networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FBradford.pdf.

Full text
Abstract:
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, September 2006.
Thesis Advisor(s): Carl Oros. "September 206." Includes bibliographical references (p. 69-70). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Ren, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

De, Wit Roland Duyvené. "Provisioning VolP wireless networks with security." Thesis, Bloemfontein : Central University of Technology, Free State, 2008. http://hdl.handle.net/11462/47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Harbin, James R. "Security strategies in wireless sensor networks." Thesis, University of York, 2011. http://etheses.whiterose.ac.uk/2103/.

Full text
Abstract:
This thesis explores security issues in wireless sensor networks (WSNs), and network-layer countermeasures to threats involving routing metrics. Before WSNs can mature to the point of being integrated into daily infrastructure, it is vital that the sensor network technologies involved become sufficiently mature and robust against malicious attack to be trustworthy. Although cryptographic approaches and dedicated security modules are vital, it is important to employ defence in depth via a suite of approaches. A productive approach is to integrate security awareness into the network-layer delivery mechanisms, such as multihop routing or longer-range physical layer approaches. An ideal approach would be workable within realistic channel conditions, impose no complexity for additional control packets or sentry packets, while being fully distributed and scalable. A novel routing protocol is presented (disturbance-based routing) which attempts to avoid wormholes via their static and dynamic topology properties. Simulation results demonstrate its avoidance performance advantages in a variety of topologies. A reputation-based routing approach is introduced, drawing insights from reinforcement learning, which retains routing decisions from an earlier stabilisation phase. Results again demonstrate favourable avoidance properties at a reduced energy cost. Distributed beamforming is explored at the system level, with an architecture provided allowing it to support data delivery in a predominantly multihop routing topology. The vulnerability of beamforming data transmission to jamming attacks is considered analytically and via simulation, and contrasted with multihop routing. A cross-layer approach (physical reputation-based routing) which feeds physical-layer information into the reputation-based routing algorithm is presented, permitting candidate routes that make use of the best beamforming relays to be discovered. Finally, consideration is given to further work on how cognitive security can save energy by allowing nodes to develop a more efficient awareness of their threat environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Abuaitah, Giovani Rimon. "Trusted Querying over Wireless Sensor Networks and Network Security Visualization." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1240163119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.

Full text
Abstract:
The objective of the research is to develop an accurate system for indoor location estimation using a secure architecture based on the IEEE 802.11 standard for infrastructure networks. Elements of this secure architecture include: server-oriented platform for greater trust and manageability; multiple wireless network parameters for improved accuracy; and Support Vector Regression (SVR) for accurate, high-resolution estimates. While these elements have been investigated individually in earlier research, none has combined them to a single security-oriented system. Thus this research investigates the feasibility of using these elements together.
APA, Harvard, Vancouver, ISO, and other styles
9

SANTHANAM, LAKSHMI. "Integrated Security Architecture for Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1202846575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fowler, James D. "Security planning for wireless networks : DoD concerns." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA362720.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 1999.
Thesis advisor(s): Cynthia E. Irvine, Douglas Brinkley. "March 1999". Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Wireless security networks"

1

Khan, Shafiullah, and Al-Sakib Khan Pathan, eds. Wireless Networks and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36169-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Yan. Security in wireless mesh networks. Boca Raton, FL: Auerbach Publications, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oreku, George S., and Tamara Pazynyuk. Security in Wireless Sensor Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-21269-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krishna, Sankar, ed. Cisco wireless LAN security. Indianapolis, IN: Cisco, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

David, Pollino, and NetLibrary Inc, eds. Wireless security. New York: McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Praphul, Chandra, ed. Wireless security. Amsterdam: Newnes/Elsevier, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mahmoud, Mohamed M. E. A., and Xuemin Shen. Security for Multi-hop Wireless Networks. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04603-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schäfer, Günter. Security in Fixed and Wireless Networks. Chichester, UK: John Wiley & Sons, Ltd, 2003. http://dx.doi.org/10.1002/0470863722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Anjum, Farooq, and Petros Mouchtaris. Security for Wireless Ad Hoc Networks. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2006. http://dx.doi.org/10.1002/0470118474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Petros, Mouchtaris, and Wiley online library, eds. Security for wireless ad hoc networks. Hoboken, N.J: Wiley-Interscience, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Wireless security networks"

1

Seon Hong, Choong, Latif U. Khan, Mingzhe Chen, Dawei Chen, Walid Saad, and Zhu Han. "Security and Privacy." In Wireless Networks, 129–41. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4963-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Holt, Alan, and Chi-Yu Huang. "Wireless Security." In Computer Communications and Networks, 101–10. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-275-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Shanzhi, Jinling Hu, Li Zhao, Rui Zhao, Jiayi Fang, Yan Shi, and Hui Xu. "C-V2X Security Technology." In Wireless Networks, 271–308. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-5130-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Peng, and Chuang Lin. "Security Threats in Network Coding." In Wireless Networks, 9–19. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31083-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Jiangxing. "Security Risks from Vulnerabilities and Backdoors." In Wireless Networks, 3–38. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29844-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Kuan, and Xuemin Shen. "Security and Privacy Challenges in MHN." In Wireless Networks, 11–20. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24717-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Selmic, Rastko R., Vir V. Phoha, and Abdul Serwadda. "Security in WSNs." In Wireless Sensor Networks, 83–115. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46769-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zou, Yulong, and Jia Zhu. "Security-Reliability Tradeoff for Cooperative Relay Networks." In Wireless Networks, 53–71. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31174-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lei, Wan, Anthony C. K. Soong, Liu Jianghua, Wu Yong, Brian Classon, Weimin Xiao, David Mazzarese, Zhao Yang, and Tony Saboorian. "5G Security System Design for All Ages." In Wireless Networks, 341–90. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73703-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brecht, Benedikt, and Thorsten Hehn. "A Security Credential Management System for V2X Communications." In Wireless Networks, 83–115. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94785-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wireless security networks"

1

J. Grahn, Kaj, Göran Pulkkis, and Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.

Full text
Abstract:
This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN/2, IPSec and Bluetooth, are included. A local area network, MediaPoli, has been implemented to work as a testbed for new innovations, products and services. The development environment is based on this high-capacity wired/wireless broadband network. Key research areas, actual projects and offered services are discussed. All activities aim at the future information society.
APA, Harvard, Vancouver, ISO, and other styles
2

Vieira, Antônio Carlos Castañon, Sergio Luiz Cardoso Salomão, Aloysio de Castro Pinto Pedrosa, and Antônio Carneiro de Mesquita Filho. "Security Applications for Ad Hoc Networks." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2003. http://dx.doi.org/10.5753/sbseg.2003.21251.

Full text
Abstract:
Nowadays, data security is an important issue in telecommunication network to be considered in its implementation and operation, mainly in wireless network without infrastructure as the Ad Hoc networks. This paper presents the Godzuk symmetric cryptographic algorithm, as a possible standard for this kind of mobile communication.
APA, Harvard, Vancouver, ISO, and other styles
3

Paavola, Jarkko, Tuomo Rautava, Juhani Hallio, Juha Kalliovaara, and Tero Jokela. "Use of wireless communication networks in digitalization of factory environments." In CARPE Conference 2019: Horizon Europe and beyond. Valencia: Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10050.

Full text
Abstract:
Wireless communications are rapidly taking an important role in factory environment. The current Wi-Fi technologies struggle to meet the requirements of industrial factories, for example with regard to latency and security. The emerging 5G communication networks are the first networks expected to meet such requirements. Private networks are owned by the factories themselves. Private networks can utilize 5G technologies to tailor the networks to meet the exact demands within the factory environment and guarantee that the factories can use the whole bandwidth for their own use. This concurrently increases the data security as the data does not need to be deliveved over public networks. This paper describes the latest developments in 5G with regard to private networks and Industry 4.0, which is the name given to the digitalization, automatization and data exchange trend currently ongoing in factory environments. In this paper we describe a private cellular network we have installed inside a factory building. This network has been trialed with wireless pyrometer measurement data transmission and environmental surveillance of a measurement laboratory. This paper analyses the suitability of private networks for these use cases and discusses in general which applications would benefit the most from private wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Martinovic, Ivan, Nicos Gollan, and Jens B. Schmitt. "Firewalling wireless sensor networks: Security by wireless." In 2008 33rd IEEE Conference on Local Computer Networks (LCN 2008). IEEE, 2008. http://dx.doi.org/10.1109/lcn.2008.4664279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Burgner, Daniel E., and Luay A. Wahsheh. "Security of Wireless Sensor Networks." In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Ka'bi, Amin H. "Security in mobile wireless networks." In 2013 International Conference on Signal Processing and Communication (ICSC). IEEE, 2013. http://dx.doi.org/10.1109/icspcom.2013.6719746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Johnson, Ashley, Joseph Molloy, Jonathan Yunes, Joseph Puthuparampil, and Abdelrahman Elleithy. "Security in Wireless Sensors Networks." In 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2019. http://dx.doi.org/10.1109/lisat.2019.8817338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Larsson, Andreas, and Philippas Tsigas. "Security in Wireless Sensor Networks." In 2011 Seventh European Conference on Computer Network Defense (EC2ND). IEEE, 2011. http://dx.doi.org/10.1109/ec2nd.2011.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kasimov, S. S., E. N. Bugibaev, and S. D. Arzikulov. "Wireless networks and information security." In 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet. IEEE, 2007. http://dx.doi.org/10.1109/canet.2007.4401684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Yilin, and Maosheng Qin. "Security for wireless sensor networks." In 2010 International Conference on Control, Automation and Systems (ICCAS 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccas.2010.5669748.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Wireless security networks"

1

Frankel, S. E., B. Eydt, L. Owens, and K. A. Scarfone. Establishing wireless robust security networks :. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Souppaya, M. P., and K. A. Scarfone. Guidelines for securing Wireless Local Area Networks (WLANs). Gaithersburg, MD: National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Scarfone, K. A., D. Dicoi, M. Sexton, and C. Tibbs. Guide to securing legacy IEEE 802.11 wireless networks. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-48r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Skalka, Christian. A Language-Based Approach To Wireless Sensor Network Security. Fort Belvoir, VA: Defense Technical Information Center, March 2014. http://dx.doi.org/10.21236/ada597308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography