๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Privacy and Security in Wireless Computing

โœ Scribed by John S Kakalik; Marie A Wright


Publisher
Elsevier Science
Year
2000
Tongue
English
Weight
195 KB
Volume
2000
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

โœฆ Synopsis


Currently, there are about eighty-nine million wireless subscribers in North America and 162 million in Europe. 1 By 2004, the numbers of wireless subscribers in North America and Europe are expected to surpass 190 million and 375 million, respectively.

As consumers demand more mobility and connectivity to keep pace with an expanded range of duties and competitive business pressures, 2 industry is responding by using insecure Internet technologies. In turn, the use of these technologies has increased the likelihood of successful attacks against systems, networks and data.

This article explores the privacy and security implications of wireless computing. It begins by treating the threats to system and data security and personal privacy that are exacerbated by wireless technology. It then identifies a security vulnerability in the Wireless Application Protocol. Next, the article presents a number of behavioral and technological controls that are designed to mitigate the impact of the security threats. It concludes with the need to implement effective data ownership and protection policies.

Threats

Wireless technology allows users to perform activities from remote locations that were once limited to their offices. E-mail, voice mail, Web browsing, file uploading and downloading, application access, and streaming media 2 are conducted through the use of mobile systems that are open, unprotected and insecure. It is now easier to threaten both systems and data. The threats occur with respect to confidentiality, integrity and availability.

Threats to Confidentiality and Integrity

The confidentiality and integrity of systems and data are compromized by unauthorized access. In the complex wireless environment, numerous alternatives exist for gaining unauthorized access to systems feature 12


๐Ÿ“œ SIMILAR VOLUMES


Security and privacy for the next wirele
โœ Pascal Urien; Guy Pujolle ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 716 KB

## Abstract This paper presents research performed during the last 4 years (2003โ€“2007), in order to design applications (usually referred as __EAP smart cards__) which enhance security and privacy in emerging WLAN infrastructures. It introduces smart cards ensuring strong authentication in IP netwo

Security and privacy
โœ Joseph M. Pujals ๐Ÿ“‚ Article ๐Ÿ“… 1993 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 440 KB
Secure median computation in wireless se
โœ Sankardas Roy; Mauro Conti; Sanjeev Setia; Sushil Jajodia ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 633 KB

Wireless sensor networks (WSNs) have proven to be useful in many applications, such as military surveillance and environment monitoring. To meet the severe energy constraints in WSNs, several researchers have proposed to use the in-network data aggregation technique (i.e., combining partial results

Workplace privacy and data security
โœ William C. Martucci; Jennifer K. Oldvader ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 89 KB