Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Chapter

Download BibTeX

Title

Data Security in Emerging Wireless Technologies

Authors

[ 1 ] Instytut Automatyki i Inżynierii Informatycznej, Wydział Elektryczny, Politechnika Poznańska | [ P ] employee

Year of publication

2013

Chapter type

chapter in monograph

Publication language

english

Keywords
EN
  • computer networks data security
  • wireless transmission
Abstract

EN Wireless transmission systems are continually developing. There are many improvements in the field. The development is gradual and sometimes revolutionary. The question is, if these new func-tions, new methods, new modes of wireless transmission may lead to new security threats and vulner-abilities? The paper is dedicated to some emerging wireless transmission innovations and security is-sues related to these innovations. Such technologies and transmission methods as: NFC (Near Field Communication), VLC (Visible Light Communication), Handover, Mesh networks, 4G and 5G cellu-lar network, Mobile IPv6, beamforming, MIMO (Multiple Input Multiple Output), OFDMA (Orthog-onal Frequency Division Multiple Access) are included into the research. The main purpose of the paper is to identify, analyse and classify distinctive sets of threats and vulnerabilities as well as some data protection opportunities related to innovative wireless transmission methods and technologies. Some of these emerging technologies may be used to improve security, while others create new threats and risks to data security. We will distinguish extraordinary sets of threats and vulnerabilities related to such factors as: energy consumption constraints in mobile devices, specific frequency band (e.g. EHF, visual), particular mode of transmission (e.g. MIMO, OFDMA), user mobility, interfer-ence and jamming.

Pages (from - to)

119 - 128

Book

Information systems architecture and technology : network architecture and applications

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.