Wireless Security and Privacy Issues

Wireless Security and Privacy Issues

Joarder Kamruzzaman (Monash University, Australia)
DOI: 10.4018/978-1-59140-766-9.ch011
OnDemand PDF Download:


Security and privacy protection are very strong requirements for the widespread deployment of wireless technologies for commercial applications. The primary aim of this chapter is to present an overview of the security and privacy issues by highlighting the need to secure access to wireless networks and the loss that might accrue from the breach of a network. The vulnerabilities of the IEEE 802.11 and Bluetooth networks are discussed, and a paradigm for secure wireless network is presented. The legal framework guiding the privacy issues in wireless communications is also presented.

Complete Chapter List

Search this Book:
Table of Contents
Gour Karmakar, Laurence S. Dooley
Gour Karmakar, Laurence S. Dooley
Chapter 1
Gour C. Karmakar, Laurence S. Dooley, Michael Mathew
In order to meet the ever increasing demand by people using mobile technology and its associated services based on multimedia elements in addition... Sample PDF
Introduction to Mobile Multimedia Communications
Chapter 2
Surendra Kumar Sivagurunathan, Mohammed Atiquzzaman
With the proliferation of wireless data networks, there is an increasing interest in carrying multimedia over wireless networks using portable... Sample PDF
Multimedia over Wireless Mobile Data Networks
Chapter 3
Nalin Sharda
The focus of this chapter is on the quality of service (QoS) aspects involved in transmitting multimedia information via mobile systems. Multimedia... Sample PDF
Quality of Service Issues in Mobile Multimedia Transmission
Chapter 4
Odej Kao, Stefan Lietsch
This chapter introduces a personalized system for device independent and position aware communication. It combines the advantages of mobile... Sample PDF
On a Personalized System for Device Independent and Position Aware Communication
Chapter 5
Nina Reeves, Sally Jo Cunningham, Laura Jefferies, Catherine Harris
Aphasia is a speech disorder usually caused by stroke or head injury (Armstrong, 1993). Related communication difficulties can include word finding... Sample PDF
Mobile Multimedia for Speech and Language Therapy
Chapter 6
Indrit Troshani, Sally Rao Hill
Mobile services are touted to create a significant spectrum of business opportunities. Acceptance of these services by users is, therefore, of... Sample PDF
A Proposed Framework for Mobile Services Adoption: A Review of Existing Theories, Extensions, and Future Research Directions
Chapter 7
Ferdous Ahmed Sohel, Gour C. Karmakar, Laurence S. Dooley
With the significant influence and increasing requirements of visual mobile communications in our everyday lives, low bit-rate video coding to... Sample PDF
Video Coding for Mobile Communications
Chapter 8
Hermann Rohling
The orthogonal frequency division multiplexing (OFDM) transmission technique can efficiently deal with multi-path propagation effects especially in... Sample PDF
OFDM Transmission Technique: A Strong Candidate for the Next Generation Mobile Communications
Chapter 9
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
Ad-hoc networks have been the focus of research interest in wireless networks since 1990. Nodes in an ad-hoc network can connect to each other... Sample PDF
Routing Protocols for Ad-Hoc Networks
Chapter 10
Kevin Park, Jairo A. Gutierrez
Networking is no longer a luxury but rather has reached a stage where it could be regarded as a commodity, if not a necessity. Improvements in... Sample PDF
Basics of Ubiquitous Networking
Chapter 11
Joarder Kamruzzaman
Security and privacy protection are very strong requirements for the widespread deployment of wireless technologies for commercial applications. The... Sample PDF
Wireless Security and Privacy Issues
Chapter 12
Goran Pulkkis, Kaj J. Grahn, Jonny Karlsson, Nhat Dai Tran
This chapter surveys security of mobile computing devices with focus on multimedia applications. Mobile computing devices are handheld devices such... Sample PDF
Security of Mobile Devices for Multimedia Applications
Chapter 13
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
Due to the nature of wireless media, dynamic network topology, resource constraints, and lack of any base station or access point, security in... Sample PDF
Security in Ad-Hoc Networks
Chapter 14
Sheikh I. Ahamed, Mohammad Zulkernine, Munirul M. Haque
Pervasive computing has progressed significantly during this decade due to the developments and advances in portable, low-cost, and light-weight... Sample PDF
Security, Privacy, and Trust for Pervasive Computing Applications
About the Contributors