Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download BibTeX

Title

New Threats and Innovative Protection Methods in Wireless Transmission Systems

Authors

[ 1 ] Instytut Automatyki i Inżynierii Informatycznej, Wydział Elektryczny, Politechnika Poznańska | [ P ] employee

Year of publication

2014

Published in

Journal of Telecommunications and Information Technology

Journal year: 2014 | Journal number: no. 3

Article type

scientific article

Publication language

english

Keywords
EN
  • authentication
  • confidentiality
  • cryptography
  • threats
  • vulnerabilities
  • wireless transmission
Abstract

EN Many improvements in the field of wireless communication can be observed nowadays. Some developments are gradual, others are revolutionary. It is obvious that each innovation in the area may lead to new security threats and vulnerabilities. Such technologies and transmission methods as: Near Field Communication (NFC), Visible Light Communication (VLC), handover, mesh networks, 5G cellular network, mobile IPv6, beamforming, cooperative beamforming, Multiple Input Multiple Output (MIMO), Orthogonal Frequency Division Multiple Access (OFDMA), transmission in Extra High Frequency (EHF) band are very important from the security point of view. In order to preserve high level of security one needs to identify, analyse and classify distinctive sets of threats and vulnerabilities as well as some emerging data protection opportunities related to innovative wireless transmission methods and technologies. This identification, analysis and classification is a main purpose of the paper. It will focus on cryptography in wireless systems, security vs. energy tradeoffs, physical layer security. For example, common problems related to cryptography may be solved with a use of physical layer security. Data confidentiality may be fulfilled with a use of beamforming and jamming, authentication may be performed with a use of out-of-band authentication model.

Pages (from - to)

26 - 33

URL

http://yadda.icm.edu.pl/baztech/element/bwmeta1.element.baztech-877c58f1-e716-4b8d-911b-d8feeef0b504?q=bwmeta1.element.baztech-79fa069e-c449-436e-a5c1-1e2bbde3e723;2&qt=CHILDREN-STATELESS

Ministry points / journal

12

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.