6. Conclusion
Even if security solutions are not yet perfected, the deployment of wireless networks is already underway, and will continue to grow in the years to come due to the increasing needs of users in terms of mobility, flexibility and services. To achieve this, industry and academia are tasked with designing security mechanisms adapted to wireless networks. This means encrypting communications to prevent eavesdropping, and constantly verifying terminal identity. These mechanisms must also take into account the limited bandwidth and processing capacity of terminals...
In this dossier, we have briefly presented existing and emerging wireless technologies, with their characteristics, main technological obstacles, safety issues... (see summary, table 1 ). A more detailed description is available in a three-volume IC2...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
References
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!