Privacy and Security of Wireless Communication Networks

Author(s):  
Sattar B. Sadkhan ◽  
Nidaa A. Abbas

Wireless networks are inherently more vulnerable than their wired counterparts. In addition, complications arise in the presence of node mobility and dynamic network topology. Moreover, intermittent connectivity, whether caused by mobility or periodic node sleep, brings about additional challenges. At the same time, node resource constraints make direct adoption of existing security solutions difficult, if not impossible. Wireless Communication Network Security and Privacy analyze important problems in the realms of wireless networks and mobile computing. The Security aspects relate to authentication, access control and authorization, nonrepudation, privacy and confidentiality, integrity, and auditing. Privacy is an essential feature of any product or service.

Author(s):  
Sattar B. Sadkhan ◽  
Nidaa A. Abbas

Wireless networks are inherently more vulnerable than their wired counterparts. In addition, complications arise in the presence of node mobility and dynamic network topology. Moreover, intermittent connectivity, whether caused by mobility or periodic node sleep, brings about additional challenges. At the same time, node resource constraints make direct adoption of existing security solutions difficult, if not impossible. Wireless Communication Network Security and Privacy analyze important problems in the realms of wireless networks and mobile computing. The Security aspects relate to authentication, access control and authorization, nonrepudation, privacy and confidentiality, integrity, and auditing. Privacy is an essential feature of any product or service.


Author(s):  
Е.Е. Девяткин ◽  
Д.Н. Федоров ◽  
Я.М. Гасс ◽  
М.В. Иванкович

Рассмотрены и классифицированы существующие узкополосные беспроводные сети связи (УБСС), реализованные с использованием конвергентных решений. Показано, что появление нового объекта регулирования УБСС интернета вещей усиливает необходимость перехода от локальных корректировок законодательства в сфере связи к созданию инфо- коммуникационного кодекса Российской Федерации. Existing narrowband wireless communication networks using convergent solutions are reviewed and classified. It is shown that the emergence of narrowband wireless networks of Internet of things increases the need for transition from local adjustments of legislation in the field of communications to the creation of the Infocommunication Code of the Russian Federation.


Author(s):  
Kira Kastell

Communication in transportation systems not only involves the communication inside a vehicle, train, or airplane but it also includes the transfer of data to and from the transportation system or between devices belonging to that system. This will be done using different types of wireless communication. Therefore in this chapter, first, the fundamentals of mobile communication networks are shortly described. Thereafter, possible candidate networks are discussed. Their suitability for a certain transportation system can be evaluated taking into consideration the system's requirements. Among the most prominent are the influence of speed and mobility, data rate and bit error rate constraints, reliability of the system and on-going connections. As in most of the cases, there will be no single best wireless communication network to fulfil all requirements, and in this chapter also hybrid networks are discussed. These are networks consisting of different (wireless) access networks. The devices may use the best suited network for a given situation but also change to another network while continuing the on-going connection or data transfer. Here the design of the handover or relocation plays a critical role as well as localization.


Author(s):  
Pouwan Lei ◽  
Jia Jia Wang

The mobile phone industry has experienced an explosive growth in recent years. The emerging markets such as China, India, and Brazil contribute this growth. In China, the number of mobile subscribers has already surpassed the number of fixed landline phone subscribers. In Korea and Japan, there is an explosion of mobile and wireless services. The United States are joining too and there were 207.9 million subscribers in 2005 (CTIA, 2006). Mobile e-commerce (m-commerce) makes business mobility a reality; mobile users could access the Internet at any time, from anywhere with handheld devices or laptop. A 3G enabled smart phone enables you to access a wide range of services anywhere and anytime. For example, you can send and receive e-mail, make cinema and restaurant reservations and pay for them, check real train time, look at digital maps, download music and games, and also browse the Internet. Mobile and wireless services are ranging from mobile communication networks to wireless local area networks. The service provided by mobile communication systems has achieved huge success as mobile and wireless communication technologies are converging at fast speed. We will study mobile and wireless communication in relation to mobile phones. Hence, m-commerce is defined as electronic commerce carried out in handheld devices such as smart phone through mobile and wireless communication network.


Author(s):  
dolfo Alan Sánchez Vázquez ◽  
Gregorio Martínez Pérez

In principle, computers networks were conceived to share resources and certain computing devices among a select group of people working in academic institutions. In this context, the security did not have high importance. Today, through the network circulates a lot of valuable data (budgets, credit card numbers, marketing data, etc.), much of which can be considered confidential. Here is where security takes great importance?so that these data cannot be read or modified by any third party, and the services offered are always available and only to authorized people (confidentiality, integrity, and readiness). When we refer to security, there are some terms of great importance. Risk is defined as any accidental or not prospective exhibition of information as consequence of the bad operation of hardware or the incorrect design of software. Vulnerabilities indicate when a failure in the operation of software and/or hardware elements exposes the system to penetrations. Starting from here we can define attack as an event against the good operation of a system, and it can be successful or not. If the attack is successful and access is obtained to the files and programs or control is obtained to the computers without being detected, then we are dealing with a penetration. This leads to an intrusion, which is a group of actions compromising the integrity, confidentiality, and readiness of computer resources (Sobh, 2006). The main objective of this article is to explain to the reader the main concepts regarding intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), and the particular issues that should be additionally considered when protecting wireless communication scenarios (in comparison with IDSs/IPSs in traditional wired networks). It also includes an extended view of the current state of the art of IDSs and IPSs in wireless networks, covering both research works done so far in this area, as well as an analysis of current open source IDSs and IPSs, and how they are dealing with the specific requirements of wireless communication networks. This article is organized as follows: First, we start with a summary of the main related works in the background section; then we give a description of the important concepts of security, a classification of intrusion detection systems, and a brief comparative of the operation of IDSs in wired and wireless networks. Next, we highlight certain research works exemplifying efforts done so far in wireless scenarios. We present the main ideas behind our current research work to model intrusions in wireless scenarios, before offering future directions of work and a summary of the main ideas expressed in the article.


2014 ◽  
Vol 577 ◽  
pp. 835-840
Author(s):  
Yan Liu ◽  
En Guo Zhu ◽  
Xuan Liu ◽  
Li Jun Dong

To improve the performance of power consumption information collection system and to solve the problem of system capacity small and the problem of low data rate, combined with the characteristics of WiMAX technology, the 230MHz wireless communication network of Power consumption information collection system was proposed based on WiMAX; The function and working methods of the communications network was designed. Implementations applicable to power consumption information collection system's key technologies was proposed such as Time division duplex, carrier aggregation, Software-Defined Radio through experimental verification. The results show that the use of this kind of communication networks can improve the data transfer rate, meet the bandwidth requirement, improve the reliability of data transmission and system Capacity and meet the business requirements of power consumption information collection system.


Sign in / Sign up

Export Citation Format

Share Document