Conclusion
Wireless networks and security
Article REF: IN77 V1
Conclusion
Wireless networks and security

Authors : Hakima CHAOUCHI, Maryline LAURENT-MAKNAVICIUS

Publication date: November 10, 2007 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

6. Conclusion

Even if security solutions are not yet perfected, the deployment of wireless networks is already underway, and will continue to grow in the years to come due to the increasing needs of users in terms of mobility, flexibility and services. To achieve this, industry and academia are tasked with designing security mechanisms adapted to wireless networks. This means encrypting communications to prevent eavesdropping, and constantly verifying terminal identity. These mechanisms must also take into account the limited bandwidth and processing capacity of terminals...

In this dossier, we have briefly presented existing and emerging wireless technologies, with their characteristics, main technological obstacles, safety issues... (see summary, table 1 ). A more detailed description is available in a three-volume IC2...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details