By Topic

Secure wireless networking

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Adrian Perrig ; Electrical and Computer Engineering, Engineering and Public Policy, and Computer Science at Carnegie Mellon University ; Wade Trappe ; Virgil Gligor ; Radha Poovendran
more authors

Wireless technologies have had a significant impact on computing and communication technologies in the past decade, and we are thus now progressing to the new "anytime-anywhere" service model of the mobile Internet. Unfortunately, the affordability and availability of wireless technologies that makes them so attractive, also makes them an enticing target for security threats. As new wireless technologies continue to emerge, many of which will be highly flexible and programmable (such as the next generation of software radios), it will be easier than ever before for adversaries to acquire the equipment and the means to launch new security or privacy attacks.

Published in:

Journal of Communications and Networks  (Volume:11 ,  Issue: 6 )