Academic literature on the topic 'Wireless security networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless security networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Wireless security networks"
Shokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.
Full textSingh, Barinder Paul, Anish Arora, and Ashish Kumar. "Security in Wireless Sensor Networks." JOURNAL OF ADVANCES IN PHYSICS 1, no. 1 (October 25, 2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.
Full textHari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (December 20, 2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.
Full textHadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (January 20, 2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.
Full textABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (April 1, 2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.
Full textChen, De Feng, Wen Yan Zhang, and Zhi Bin Yang. "Research and Implementation of a Wireless Network Security Inspection Platform for a Power Supply Enterprise." Applied Mechanics and Materials 602-605 (August 2014): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2134.
Full textP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.
Full textP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.
Full textKumari, Shabnam, and Sumit Dalal. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 477–83. http://dx.doi.org/10.31142/ijtsrd12931.
Full textPrabhakar, Abhishek, Amod Tiwari, and Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (April 19, 2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.
Full textDissertations / Theses on the topic "Wireless security networks"
GHUMMAN, SHAKEEL AHMAD. "Security in Wireless Mesh Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4175.
Full textThe Master’s thesis report describes the wireless mesh networks functions,
characteristics, network management and finally different protocols with security issues and applications. Wireless Networks (WMNs) are replacing wireless Infrastructure networks in many areas because of their lower and higher flexibility. The wireless mesh networks (WMNs) provides network access for both mesh and conventional clients through mesh routers and mesh clients. Communication across the network is formed via the bridge functions. Mesh router also provides the minimal mobility and form the backbone of WMNs.
Wireless mesh network has resolved the limitation of ad hoc networks which is ultimately improves the performance of Ad hoc networks. Security is a very important issue which can be resolve through proper management of network. The improvment of 802.11i security has greatly improved the network perfomance and increase the encryption and integrity security capabilities. The key points which are being addressed in this report are security issues and threats and their counter measures. Attacks which can come on diffent layers are being discussed in this survey. Security of wireless mesh network is still under consideration. Wireless mesh network are attracting more attention due to its enhanced features.
Wireless mesh network topology technology is being discussed in this report. Then network management of WMNs is explained and in the concluding chapters security issues are discussed. Threats, attacks and challenges of WMNs are discussed in this survey.
Jiang, Shu. "Efficient network camouflaging in wireless networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/3067.
Full textBradford, Bryan L. "Wireless security within hastily formed networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FBradford.pdf.
Full textThesis Advisor(s): Carl Oros. "September 206." Includes bibliographical references (p. 69-70). Also available in print.
Ren, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.
Full textDe, Wit Roland Duyvené. "Provisioning VolP wireless networks with security." Thesis, Bloemfontein : Central University of Technology, Free State, 2008. http://hdl.handle.net/11462/47.
Full textHarbin, James R. "Security strategies in wireless sensor networks." Thesis, University of York, 2011. http://etheses.whiterose.ac.uk/2103/.
Full textAbuaitah, Giovani Rimon. "Trusted Querying over Wireless Sensor Networks and Network Security Visualization." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1240163119.
Full textLim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.
Full textSANTHANAM, LAKSHMI. "Integrated Security Architecture for Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1202846575.
Full textFowler, James D. "Security planning for wireless networks : DoD concerns." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA362720.
Full textThesis advisor(s): Cynthia E. Irvine, Douglas Brinkley. "March 1999". Includes bibliographical references. Also available online.
Books on the topic "Wireless security networks"
Khan, Shafiullah, and Al-Sakib Khan Pathan, eds. Wireless Networks and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36169-2.
Full textZhang, Yan. Security in wireless mesh networks. Boca Raton, FL: Auerbach Publications, 2007.
Find full textOreku, George S., and Tamara Pazynyuk. Security in Wireless Sensor Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-21269-2.
Full textDavid, Pollino, and NetLibrary Inc, eds. Wireless security. New York: McGraw-Hill/Osborne, 2002.
Find full textMahmoud, Mohamed M. E. A., and Xuemin Shen. Security for Multi-hop Wireless Networks. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04603-7.
Full textSchäfer, Günter. Security in Fixed and Wireless Networks. Chichester, UK: John Wiley & Sons, Ltd, 2003. http://dx.doi.org/10.1002/0470863722.
Full textAnjum, Farooq, and Petros Mouchtaris. Security for Wireless Ad Hoc Networks. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2006. http://dx.doi.org/10.1002/0470118474.
Full textPetros, Mouchtaris, and Wiley online library, eds. Security for wireless ad hoc networks. Hoboken, N.J: Wiley-Interscience, 2007.
Find full textBook chapters on the topic "Wireless security networks"
Seon Hong, Choong, Latif U. Khan, Mingzhe Chen, Dawei Chen, Walid Saad, and Zhu Han. "Security and Privacy." In Wireless Networks, 129–41. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4963-9_5.
Full textHolt, Alan, and Chi-Yu Huang. "Wireless Security." In Computer Communications and Networks, 101–10. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-275-9_6.
Full textChen, Shanzhi, Jinling Hu, Li Zhao, Rui Zhao, Jiayi Fang, Yan Shi, and Hui Xu. "C-V2X Security Technology." In Wireless Networks, 271–308. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-5130-5_7.
Full textZhang, Peng, and Chuang Lin. "Security Threats in Network Coding." In Wireless Networks, 9–19. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31083-1_2.
Full textWu, Jiangxing. "Security Risks from Vulnerabilities and Backdoors." In Wireless Networks, 3–38. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29844-9_1.
Full textZhang, Kuan, and Xuemin Shen. "Security and Privacy Challenges in MHN." In Wireless Networks, 11–20. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24717-5_2.
Full textSelmic, Rastko R., Vir V. Phoha, and Abdul Serwadda. "Security in WSNs." In Wireless Sensor Networks, 83–115. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46769-6_4.
Full textZou, Yulong, and Jia Zhu. "Security-Reliability Tradeoff for Cooperative Relay Networks." In Wireless Networks, 53–71. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31174-6_4.
Full textLei, Wan, Anthony C. K. Soong, Liu Jianghua, Wu Yong, Brian Classon, Weimin Xiao, David Mazzarese, Zhao Yang, and Tony Saboorian. "5G Security System Design for All Ages." In Wireless Networks, 341–90. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73703-0_6.
Full textBrecht, Benedikt, and Thorsten Hehn. "A Security Credential Management System for V2X Communications." In Wireless Networks, 83–115. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94785-3_4.
Full textConference papers on the topic "Wireless security networks"
J. Grahn, Kaj, Göran Pulkkis, and Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.
Full textVieira, Antônio Carlos Castañon, Sergio Luiz Cardoso Salomão, Aloysio de Castro Pinto Pedrosa, and Antônio Carneiro de Mesquita Filho. "Security Applications for Ad Hoc Networks." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2003. http://dx.doi.org/10.5753/sbseg.2003.21251.
Full textPaavola, Jarkko, Tuomo Rautava, Juhani Hallio, Juha Kalliovaara, and Tero Jokela. "Use of wireless communication networks in digitalization of factory environments." In CARPE Conference 2019: Horizon Europe and beyond. Valencia: Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10050.
Full textMartinovic, Ivan, Nicos Gollan, and Jens B. Schmitt. "Firewalling wireless sensor networks: Security by wireless." In 2008 33rd IEEE Conference on Local Computer Networks (LCN 2008). IEEE, 2008. http://dx.doi.org/10.1109/lcn.2008.4664279.
Full textBurgner, Daniel E., and Luay A. Wahsheh. "Security of Wireless Sensor Networks." In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.62.
Full textAl-Ka'bi, Amin H. "Security in mobile wireless networks." In 2013 International Conference on Signal Processing and Communication (ICSC). IEEE, 2013. http://dx.doi.org/10.1109/icspcom.2013.6719746.
Full textJohnson, Ashley, Joseph Molloy, Jonathan Yunes, Joseph Puthuparampil, and Abdelrahman Elleithy. "Security in Wireless Sensors Networks." In 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2019. http://dx.doi.org/10.1109/lisat.2019.8817338.
Full textLarsson, Andreas, and Philippas Tsigas. "Security in Wireless Sensor Networks." In 2011 Seventh European Conference on Computer Network Defense (EC2ND). IEEE, 2011. http://dx.doi.org/10.1109/ec2nd.2011.13.
Full textKasimov, S. S., E. N. Bugibaev, and S. D. Arzikulov. "Wireless networks and information security." In 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet. IEEE, 2007. http://dx.doi.org/10.1109/canet.2007.4401684.
Full textWang, Yilin, and Maosheng Qin. "Security for wireless sensor networks." In 2010 International Conference on Control, Automation and Systems (ICCAS 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccas.2010.5669748.
Full textReports on the topic "Wireless security networks"
Frankel, S. E., B. Eydt, L. Owens, and K. A. Scarfone. Establishing wireless robust security networks :. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-97.
Full textSouppaya, M. P., and K. A. Scarfone. Guidelines for securing Wireless Local Area Networks (WLANs). Gaithersburg, MD: National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-153.
Full textScarfone, K. A., D. Dicoi, M. Sexton, and C. Tibbs. Guide to securing legacy IEEE 802.11 wireless networks. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-48r1.
Full textSkalka, Christian. A Language-Based Approach To Wireless Sensor Network Security. Fort Belvoir, VA: Defense Technical Information Center, March 2014. http://dx.doi.org/10.21236/ada597308.
Full text