Security of Wireless Communication

被引:0
|
作者
Cvrcek, Dan [1 ]
机构
[1] Brno Univ Technol, Brno, Czech Republic
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
What are the real security issues of wireless communication and wireless sensor networks in paxticular? Despite predictions of wireless sensor networks being deployed in many aspects of everyday life, real world deployments are still quite sparse. It seems that monitoring of large civil engineering structures is one of the few applications where wireless sensor networks may give enough value for the necessaxy investment. The least, several companies managing large civil structures in the UK are keen on investigating the potential of wireless sensor networks. In the light of this technology, which is built on a new paradigm of dense wireless communication networks, we can see new security challenges never experienced by engineers before. Can we appreciate the difference between wire and wireless communication and also the difference between centralised wireless networks, e.g., WiFi and largely decentralised sensor networks? We show how the shift in the technology introduces new problems that need to be solved to provide secure communication systems. The second part of the paper details particular attacks that work against current implementations of wireless sensor networks and routing, traffic analysis, and cryptography in particular.
引用
收藏
页码:119 / 134
页数:16
相关论文
共 50 条
  • [31] Enhancing Communication Security an In-Vehicle Wireless Sensor Network
    Venckauskas, Algimantas
    Taparauskas, Marius
    Grigaliunas, Sarunas
    Bruzgiene, Rasa
    [J]. ELECTRONICS, 2024, 13 (06)
  • [32] Security Management System for Oilfield Based on Embedded Wireless Communication
    Jiang Wei
    Tian Jingwen
    Cao Liting
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 604 - 606
  • [33] A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication
    Al Hayajneh, Abdullah
    Bhuiyan, Md Zakirul Alam
    McAndrew, Ian
    [J]. COMPUTERS, 2020, 9 (01)
  • [34] On communication security in wireless ad-hoc sensor networks
    Slijepcevic, S
    Potkonjak, M
    Tsiatsis, V
    Zimbeck, S
    Srivastava, MB
    [J]. WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 139 - 144
  • [35] A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security
    Singh, Rajeev
    Sharma, Teek Parval
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (02) : 1145 - 1165
  • [36] A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security
    Rajeev Singh
    Teek Parval Sharma
    [J]. Wireless Personal Communications, 2014, 77 : 1145 - 1165
  • [37] Wireless Keyboards Communication Interception - The Balance Between Convenience and Security
    Boitan, Alexandru
    Bartusica, Razvan
    Popescu, Mircea
    Valerica, Bindar
    Fratu, Octavian
    [J]. 2018 12TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2018, : 539 - 542
  • [38] Analysis of Security Algorithms towards secured communication in Wireless Networks
    Kumari, E. Hemalatha Jai
    Kannammal, A.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [39] A survey on green communication and security challenges in 5G wireless communication networks
    Gandotra, Pimmy
    Jha, Rakesh Kumar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 96 : 39 - 61
  • [40] A survey on security analysis and privacy issues of wireless multimedia communication system
    Bharadwaja, A. Vyasa
    Ganesan, V
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (03) : 338 - 346