Reference Hub2
Privacy and Security of Wireless Communication Networks

Privacy and Security of Wireless Communication Networks

Sattar B. Sadkhan, Nidaa A. Abbas
ISBN13: 9781466647817|ISBN10: 1466647817|EISBN13: 9781466647824
DOI: 10.4018/978-1-4666-4781-7.ch004
Cite Chapter Cite Chapter

MLA

Sadkhan, Sattar B., and Nidaa A. Abbas. "Privacy and Security of Wireless Communication Networks." Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications, edited by Joel J.P.C. Rodrigues, et al., IGI Global, 2014, pp. 58-78. https://doi.org/10.4018/978-1-4666-4781-7.ch004

APA

Sadkhan, S. B. & Abbas, N. A. (2014). Privacy and Security of Wireless Communication Networks. In J. Rodrigues, K. Lin, & J. Lloret (Eds.), Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications (pp. 58-78). IGI Global. https://doi.org/10.4018/978-1-4666-4781-7.ch004

Chicago

Sadkhan, Sattar B., and Nidaa A. Abbas. "Privacy and Security of Wireless Communication Networks." In Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications, edited by Joel J.P.C. Rodrigues, Kai Lin, and Jaime Lloret, 58-78. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4781-7.ch004

Export Reference

Mendeley
Favorite

Abstract

Wireless networks are inherently more vulnerable than their wired counterparts. In addition, complications arise in the presence of node mobility and dynamic network topology. Moreover, intermittent connectivity, whether caused by mobility or periodic node sleep, brings about additional challenges. At the same time, node resource constraints make direct adoption of existing security solutions difficult, if not impossible. Wireless Communication Network Security and Privacy analyze important problems in the realms of wireless networks and mobile computing. The Security aspects relate to authentication, access control and authorization, nonrepudation, privacy and confidentiality, integrity, and auditing. Privacy is an essential feature of any product or service.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.