Intelligent Shops and Communications Security
One of the most present issues of computer wirelessnetworks is the security. Comparing with their wiredcounterpart, the wireless networks not only accentuate someof the well-known security vulnerabilities but they are subjectof new and specific ones. Among the existing wirelessnetworks the ad hoc on...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Stefan cel Mare University of Suceava
2007-01-01
|
Series: | Journal of Applied Computer Science & Mathematics |
Subjects: | |
Online Access: | http://www.jacs.usv.ro/getpdf.php?issue=2&paperid=25 |
_version_ | 1828780841467117568 |
---|---|
author | Carmen Eleonora Stan Doru Eugen Tiliute |
author_facet | Carmen Eleonora Stan Doru Eugen Tiliute |
author_sort | Carmen Eleonora Stan |
collection | DOAJ |
description | One of the most present issues of computer wirelessnetworks is the security. Comparing with their wiredcounterpart, the wireless networks not only accentuate someof the well-known security vulnerabilities but they are subjectof new and specific ones. Among the existing wirelessnetworks the ad hoc ones are the most exposed to attacks andcollusions due to the absence of any centralized control. Themost efficient way to ensure the communication secrecy, inclusivelyfor ad hoc wireless networks, is the cryptography.From many reasons, following from specific operating conditions,the employment of asymmetric key techniques andPublic Key Infrastructure is not a realistic choice. In thenetworks with a large number of nodes, as wireless sensornetworks, a large number of secret keys are involved in orderto ensure the communication secrecy. While dynamicity isone of the essential features of mobile wireless networks,when nodes may leave or join the network and in the absenceof a centralized control entity, the management of secret keysis crucial. The paper presents the main aspects of mobilewireless networks security and focuses on the key managementissue in ad-hoc wireless networks. |
first_indexed | 2024-12-11T17:24:20Z |
format | Article |
id | doaj.art-5f957ba442bd47f18cbe2a62ac4658fe |
institution | Directory Open Access Journal |
issn | 2066-4273 2066-3129 |
language | English |
last_indexed | 2024-12-11T17:24:20Z |
publishDate | 2007-01-01 |
publisher | Stefan cel Mare University of Suceava |
record_format | Article |
series | Journal of Applied Computer Science & Mathematics |
spelling | doaj.art-5f957ba442bd47f18cbe2a62ac4658fe2022-12-22T00:57:02ZengStefan cel Mare University of SuceavaJournal of Applied Computer Science & Mathematics2066-42732066-31292007-01-01123135Intelligent Shops and Communications SecurityCarmen Eleonora StanDoru Eugen TiliuteOne of the most present issues of computer wirelessnetworks is the security. Comparing with their wiredcounterpart, the wireless networks not only accentuate someof the well-known security vulnerabilities but they are subjectof new and specific ones. Among the existing wirelessnetworks the ad hoc ones are the most exposed to attacks andcollusions due to the absence of any centralized control. Themost efficient way to ensure the communication secrecy, inclusivelyfor ad hoc wireless networks, is the cryptography.From many reasons, following from specific operating conditions,the employment of asymmetric key techniques andPublic Key Infrastructure is not a realistic choice. In thenetworks with a large number of nodes, as wireless sensornetworks, a large number of secret keys are involved in orderto ensure the communication secrecy. While dynamicity isone of the essential features of mobile wireless networks,when nodes may leave or join the network and in the absenceof a centralized control entity, the management of secret keysis crucial. The paper presents the main aspects of mobilewireless networks security and focuses on the key managementissue in ad-hoc wireless networks.http://www.jacs.usv.ro/getpdf.php?issue=2&paperid=25Intelligent shopsCommunications securityWireless communications |
spellingShingle | Carmen Eleonora Stan Doru Eugen Tiliute Intelligent Shops and Communications Security Journal of Applied Computer Science & Mathematics Intelligent shops Communications security Wireless communications |
title | Intelligent Shops and Communications Security |
title_full | Intelligent Shops and Communications Security |
title_fullStr | Intelligent Shops and Communications Security |
title_full_unstemmed | Intelligent Shops and Communications Security |
title_short | Intelligent Shops and Communications Security |
title_sort | intelligent shops and communications security |
topic | Intelligent shops Communications security Wireless communications |
url | http://www.jacs.usv.ro/getpdf.php?issue=2&paperid=25 |
work_keys_str_mv | AT carmeneleonorastan intelligentshopsandcommunicationssecurity AT dorueugentiliute intelligentshopsandcommunicationssecurity |