Affiliation:
1. University of Babylon, Iraq
Abstract
Wireless networks are inherently more vulnerable than their wired counterparts. In addition, complications arise in the presence of node mobility and dynamic network topology. Moreover, intermittent connectivity, whether caused by mobility or periodic node sleep, brings about additional challenges. At the same time, node resource constraints make direct adoption of existing security solutions difficult, if not impossible. Wireless Communication Network Security and Privacy analyze important problems in the realms of wireless networks and mobile computing. The Security aspects relate to authentication, access control and authorization, nonrepudation, privacy and confidentiality, integrity, and auditing. Privacy is an essential feature of any product or service.
Reference32 articles.
1. A survey of routing attacks and security measures in mobile ad-hoc networks.;JainAgrawal;Journal of Computing,2011
2. Ahmad. (2005). Wireless and mobile data. London: Wiley.
3. An overview of mobile ad hoc networks for the existing protocols and applications.;International Journal on Applications of Graph Theory and Ad Hoc Networks and Sensor Networks,2010
4. Anand. (2003). Power aware public key authentication for Bluetooth. (M.Sc. Thesis). University of Florida, Gainesville, FL.