Intelligent Shops and Communications Security

One of the most present issues of computer wirelessnetworks is the security. Comparing with their wiredcounterpart, the wireless networks not only accentuate someof the well-known security vulnerabilities but they are subjectof new and specific ones. Among the existing wirelessnetworks the ad hoc on...

Full description

Bibliographic Details
Main Authors: Carmen Eleonora Stan, Doru Eugen Tiliute
Format: Article
Language:English
Published: Stefan cel Mare University of Suceava 2007-01-01
Series:Journal of Applied Computer Science & Mathematics
Subjects:
Online Access:http://www.jacs.usv.ro/getpdf.php?issue=2&paperid=25
_version_ 1828780841467117568
author Carmen Eleonora Stan
Doru Eugen Tiliute
author_facet Carmen Eleonora Stan
Doru Eugen Tiliute
author_sort Carmen Eleonora Stan
collection DOAJ
description One of the most present issues of computer wirelessnetworks is the security. Comparing with their wiredcounterpart, the wireless networks not only accentuate someof the well-known security vulnerabilities but they are subjectof new and specific ones. Among the existing wirelessnetworks the ad hoc ones are the most exposed to attacks andcollusions due to the absence of any centralized control. Themost efficient way to ensure the communication secrecy, inclusivelyfor ad hoc wireless networks, is the cryptography.From many reasons, following from specific operating conditions,the employment of asymmetric key techniques andPublic Key Infrastructure is not a realistic choice. In thenetworks with a large number of nodes, as wireless sensornetworks, a large number of secret keys are involved in orderto ensure the communication secrecy. While dynamicity isone of the essential features of mobile wireless networks,when nodes may leave or join the network and in the absenceof a centralized control entity, the management of secret keysis crucial. The paper presents the main aspects of mobilewireless networks security and focuses on the key managementissue in ad-hoc wireless networks.
first_indexed 2024-12-11T17:24:20Z
format Article
id doaj.art-5f957ba442bd47f18cbe2a62ac4658fe
institution Directory Open Access Journal
issn 2066-4273
2066-3129
language English
last_indexed 2024-12-11T17:24:20Z
publishDate 2007-01-01
publisher Stefan cel Mare University of Suceava
record_format Article
series Journal of Applied Computer Science & Mathematics
spelling doaj.art-5f957ba442bd47f18cbe2a62ac4658fe2022-12-22T00:57:02ZengStefan cel Mare University of SuceavaJournal of Applied Computer Science & Mathematics2066-42732066-31292007-01-01123135Intelligent Shops and Communications SecurityCarmen Eleonora StanDoru Eugen TiliuteOne of the most present issues of computer wirelessnetworks is the security. Comparing with their wiredcounterpart, the wireless networks not only accentuate someof the well-known security vulnerabilities but they are subjectof new and specific ones. Among the existing wirelessnetworks the ad hoc ones are the most exposed to attacks andcollusions due to the absence of any centralized control. Themost efficient way to ensure the communication secrecy, inclusivelyfor ad hoc wireless networks, is the cryptography.From many reasons, following from specific operating conditions,the employment of asymmetric key techniques andPublic Key Infrastructure is not a realistic choice. In thenetworks with a large number of nodes, as wireless sensornetworks, a large number of secret keys are involved in orderto ensure the communication secrecy. While dynamicity isone of the essential features of mobile wireless networks,when nodes may leave or join the network and in the absenceof a centralized control entity, the management of secret keysis crucial. The paper presents the main aspects of mobilewireless networks security and focuses on the key managementissue in ad-hoc wireless networks.http://www.jacs.usv.ro/getpdf.php?issue=2&paperid=25Intelligent shopsCommunications securityWireless communications
spellingShingle Carmen Eleonora Stan
Doru Eugen Tiliute
Intelligent Shops and Communications Security
Journal of Applied Computer Science & Mathematics
Intelligent shops
Communications security
Wireless communications
title Intelligent Shops and Communications Security
title_full Intelligent Shops and Communications Security
title_fullStr Intelligent Shops and Communications Security
title_full_unstemmed Intelligent Shops and Communications Security
title_short Intelligent Shops and Communications Security
title_sort intelligent shops and communications security
topic Intelligent shops
Communications security
Wireless communications
url http://www.jacs.usv.ro/getpdf.php?issue=2&paperid=25
work_keys_str_mv AT carmeneleonorastan intelligentshopsandcommunicationssecurity
AT dorueugentiliute intelligentshopsandcommunicationssecurity