6. Conclusion
Even if security solutions are not yet perfected, the deployment of wireless networks is already underway, and will continue to grow in the years to come due to the increasing needs of users in terms of mobility, flexibility and services. To achieve this, industry and academia are tasked with designing security mechanisms adapted to wireless networks. This means encrypting communications to prevent eavesdropping, and constantly verifying terminal identity. These mechanisms must also take into account the limited bandwidth and processing capacity of terminals...
In this dossier, we have briefly presented existing and emerging wireless technologies, with their characteristics, main technological obstacles, safety issues... (see summary, table 1 ). A more detailed description is available in a three-volume IC2...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Conclusion
References
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference