Security Architectures of Mobile Computing

Security Architectures of Mobile Computing

Kaj Grahn (Arcada Polytechnic, Finland), Göran Pulkkis (Arcada Polytechnic, Finland), Jonny Karlsson (Arcada Polytechnic, Finland) and Dai Tran (Arcada Polytechnic, Finland)
Copyright: © 2009 |Pages: 14
DOI: 10.4018/978-1-60566-054-7.ch202
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Mobile Internet users expect the same network service quality as over a wire. Technologies, protocols, and standards supporting wired and wireless Internet are converging. Mobile devices are resource constrained due to size, power, and memory. The portability making these devices attractive also causes data exposure and network penetration risks. Mobile devices can connect to many different wireless network types, such as cellular networks, personal area networks, wireless local area networks (WLANs), metropolitan area networks (MANs), and wide area networks (satellite-based WANs). Wireless network application examples are e-mailing, Web browsing, m-commerce, electronic payments, synchronization with a desktop computer, network monitoring/management, and reception of video/audio streams.

Complete Chapter List

Search this Book:
Reset