Academic literature on the topic 'Wireless security networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless security networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wireless security networks"

1

Shokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Barinder Paul, Anish Arora, and Ashish Kumar. "Security in Wireless Sensor Networks." JOURNAL OF ADVANCES IN PHYSICS 1, no. 1 (2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.

Full text
Abstract:
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor n
APA, Harvard, Vancouver, ISO, and other styles
3

Hari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.

Full text
Abstract:
One of the most important types that used to transfer data between nodes without using wires is a “wireless communication network”, where the transmission of data is censored remotely by using electromagnetic waves such as radio waves that usually implemented in the physical layer of the network. Continuous improvements in wireless network technology have reduced the security and speed differences between types of networks (wired and wireless), but in turn, increased security threats to wirelessly transmitted data. Wireless networks are weak in terms of "privacy protection" because anyone who
APA, Harvard, Vancouver, ISO, and other styles
5

ABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.

Full text
Abstract:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, De Feng, Wen Yan Zhang, and Zhi Bin Yang. "Research and Implementation of a Wireless Network Security Inspection Platform for a Power Supply Enterprise." Applied Mechanics and Materials 602-605 (August 2014): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2134.

Full text
Abstract:
Currently, information security inspection can only be conducted via network scan using a laptop, which results in a low-efficient one-by-one check, and moreover lacks the ability to locate wireless networks and not to mention technical measures to discover hidden networks. With respect to the regulations of a power supply enterprise regarding wireless network security, combined with the operation and maintenance comprehensive supervision system (IMS), and the information extranet security monitoring system (ISS), a cascading wireless network security inspection platform is studied and impleme
APA, Harvard, Vancouver, ISO, and other styles
7

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.

Full text
Abstract:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these netw
APA, Harvard, Vancouver, ISO, and other styles
8

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.

Full text
Abstract:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these netw
APA, Harvard, Vancouver, ISO, and other styles
9

Kumari, Shabnam, and Sumit Dalal. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 477–83. http://dx.doi.org/10.31142/ijtsrd12931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Prabhakar, Abhishek, Amod Tiwari, and Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.

Full text
Abstract:
Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Wireless security networks"

1

GHUMMAN, SHAKEEL AHMAD. "Security in Wireless Mesh Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4175.

Full text
Abstract:
<p>The Master’s thesis report describes the wireless mesh networks functions,</p><p>characteristics, network management and finally different protocols with security issues and applications. Wireless Networks (WMNs) are replacing wireless Infrastructure networks in many areas because of their lower and higher flexibility. The wireless mesh networks (WMNs) provides network access for both mesh and conventional clients through mesh routers and mesh clients. Communication across the network is formed via the bridge functions. Mesh router also provides the minimal mobility and form the backbone of
APA, Harvard, Vancouver, ISO, and other styles
2

Jiang, Shu. "Efficient network camouflaging in wireless networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/3067.

Full text
Abstract:
Camouflaging is about making something invisible or less visible. Network camouflaging is about hiding certain traffic information (e.g. traffic pattern, traffic flow identity, etc.) from internal and external eavesdroppers such that important information cannot be deduced from it for malicious use. It is one of the most challenging security requirements to meet in computer networks. Existing camouflaging techniques such as traffic padding, MIX-net, etc., incur significant performance degradation when protected networks are wireless networks, such as sensor networks and mobile ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
3

Bradford, Bryan L. "Wireless security within hastily formed networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FBradford.pdf.

Full text
Abstract:
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, September 2006.<br>Thesis Advisor(s): Carl Oros. "September 206." Includes bibliographical references (p. 69-70). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Ren, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

De, Wit Roland Duyvené. "Provisioning VolP wireless networks with security." Thesis, Bloemfontein : Central University of Technology, Free State, 2008. http://hdl.handle.net/11462/47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Harbin, James R. "Security strategies in wireless sensor networks." Thesis, University of York, 2011. http://etheses.whiterose.ac.uk/2103/.

Full text
Abstract:
This thesis explores security issues in wireless sensor networks (WSNs), and network-layer countermeasures to threats involving routing metrics. Before WSNs can mature to the point of being integrated into daily infrastructure, it is vital that the sensor network technologies involved become sufficiently mature and robust against malicious attack to be trustworthy. Although cryptographic approaches and dedicated security modules are vital, it is important to employ defence in depth via a suite of approaches. A productive approach is to integrate security awareness into the network-layer delive
APA, Harvard, Vancouver, ISO, and other styles
7

Abuaitah, Giovani Rimon. "Trusted Querying over Wireless Sensor Networks and Network Security Visualization." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1240163119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.

Full text
Abstract:
The objective of the research is to develop an accurate system for indoor location estimation using a secure architecture based on the IEEE 802.11 standard for infrastructure networks. Elements of this secure architecture include: server-oriented platform for greater trust and manageability; multiple wireless network parameters for improved accuracy; and Support Vector Regression (SVR) for accurate, high-resolution estimates. While these elements have been investigated individually in earlier research, none has combined them to a single security-oriented system. Thus this research investigates
APA, Harvard, Vancouver, ISO, and other styles
9

SANTHANAM, LAKSHMI. "Integrated Security Architecture for Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1202846575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fowler, James D. "Security planning for wireless networks : DoD concerns." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA362720.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 1999.<br>Thesis advisor(s): Cynthia E. Irvine, Douglas Brinkley. "March 1999". Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Wireless security networks"

1

Khan, Shafiullah, and Al-Sakib Khan Pathan, eds. Wireless Networks and Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36169-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Yan. Security in wireless mesh networks. Auerbach Publications, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oreku, George S., and Tamara Pazynyuk. Security in Wireless Sensor Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-21269-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krishna, Sankar, ed. Cisco wireless LAN security. Cisco, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

David, Pollino, and NetLibrary Inc, eds. Wireless security. McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Praphul, Chandra, ed. Wireless security. Newnes/Elsevier, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mahmoud, Mohamed M. E. A., and Xuemin Shen. Security for Multi-hop Wireless Networks. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04603-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schäfer, Günter. Security in Fixed and Wireless Networks. John Wiley & Sons, Ltd, 2003. http://dx.doi.org/10.1002/0470863722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Anjum, Farooq, and Petros Mouchtaris. Security for Wireless Ad Hoc Networks. John Wiley & Sons, Inc., 2006. http://dx.doi.org/10.1002/0470118474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Petros, Mouchtaris, and Wiley online library, eds. Security for wireless ad hoc networks. Wiley-Interscience, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Wireless security networks"

1

Seon Hong, Choong, Latif U. Khan, Mingzhe Chen, Dawei Chen, Walid Saad, and Zhu Han. "Security and Privacy." In Wireless Networks. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4963-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Holt, Alan, and Chi-Yu Huang. "Wireless Security." In Computer Communications and Networks. Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-275-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Shanzhi, Jinling Hu, Li Zhao, et al. "C-V2X Security Technology." In Wireless Networks. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-5130-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Peng, and Chuang Lin. "Security Threats in Network Coding." In Wireless Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31083-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Jiangxing. "Security Risks from Vulnerabilities and Backdoors." In Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29844-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Kuan, and Xuemin Shen. "Security and Privacy Challenges in MHN." In Wireless Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24717-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Selmic, Rastko R., Vir V. Phoha, and Abdul Serwadda. "Security in WSNs." In Wireless Sensor Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46769-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zou, Yulong, and Jia Zhu. "Security-Reliability Tradeoff for Cooperative Relay Networks." In Wireless Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31174-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lei, Wan, Anthony C. K. Soong, Liu Jianghua, et al. "5G Security System Design for All Ages." In Wireless Networks. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73703-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brecht, Benedikt, and Thorsten Hehn. "A Security Credential Management System for V2X Communications." In Wireless Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94785-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wireless security networks"

1

J. Grahn, Kaj, Göran Pulkkis, and Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.

Full text
Abstract:
This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN/2, IPSec and Bluetooth, are included. A local area network, MediaPoli, has been implemented to work as a testbed for new innovations, products and services. The development environment is based on th
APA, Harvard, Vancouver, ISO, and other styles
2

Vieira, Antônio Carlos Castañon, Sergio Luiz Cardoso Salomão, Aloysio de Castro Pinto Pedrosa, and Antônio Carneiro de Mesquita Filho. "Security Applications for Ad Hoc Networks." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2003. http://dx.doi.org/10.5753/sbseg.2003.21251.

Full text
Abstract:
Nowadays, data security is an important issue in telecommunication network to be considered in its implementation and operation, mainly in wireless network without infrastructure as the Ad Hoc networks. This paper presents the Godzuk symmetric cryptographic algorithm, as a possible standard for this kind of mobile communication.
APA, Harvard, Vancouver, ISO, and other styles
3

Paavola, Jarkko, Tuomo Rautava, Juhani Hallio, Juha Kalliovaara, and Tero Jokela. "Use of wireless communication networks in digitalization of factory environments." In CARPE Conference 2019: Horizon Europe and beyond. Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10050.

Full text
Abstract:
Wireless communications are rapidly taking an important role in factory environment. The current Wi-Fi technologies struggle to meet the requirements of industrial factories, for example with regard to latency and security. The emerging 5G communication networks are the first networks expected to meet such requirements. Private networks are owned by the factories themselves. Private networks can utilize 5G technologies to tailor the networks to meet the exact demands within the factory environment and guarantee that the factories can use the whole bandwidth for their own use. This concurrently
APA, Harvard, Vancouver, ISO, and other styles
4

Martinovic, Ivan, Nicos Gollan, and Jens B. Schmitt. "Firewalling wireless sensor networks: Security by wireless." In 2008 33rd IEEE Conference on Local Computer Networks (LCN 2008). IEEE, 2008. http://dx.doi.org/10.1109/lcn.2008.4664279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Burgner, Daniel E., and Luay A. Wahsheh. "Security of Wireless Sensor Networks." In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Ka'bi, Amin H. "Security in mobile wireless networks." In 2013 International Conference on Signal Processing and Communication (ICSC). IEEE, 2013. http://dx.doi.org/10.1109/icspcom.2013.6719746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Johnson, Ashley, Joseph Molloy, Jonathan Yunes, Joseph Puthuparampil, and Abdelrahman Elleithy. "Security in Wireless Sensors Networks." In 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2019. http://dx.doi.org/10.1109/lisat.2019.8817338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Larsson, Andreas, and Philippas Tsigas. "Security in Wireless Sensor Networks." In 2011 Seventh European Conference on Computer Network Defense (EC2ND). IEEE, 2011. http://dx.doi.org/10.1109/ec2nd.2011.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kasimov, S. S., E. N. Bugibaev, and S. D. Arzikulov. "Wireless networks and information security." In 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet. IEEE, 2007. http://dx.doi.org/10.1109/canet.2007.4401684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Yilin, and Maosheng Qin. "Security for wireless sensor networks." In 2010 International Conference on Control, Automation and Systems (ICCAS 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccas.2010.5669748.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Wireless security networks"

1

Frankel, S. E., B. Eydt, L. Owens, and K. A. Scarfone. Establishing wireless robust security networks :. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Souppaya, M. P., and K. A. Scarfone. Guidelines for securing Wireless Local Area Networks (WLANs). National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Scarfone, K. A., D. Dicoi, M. Sexton, and C. Tibbs. Guide to securing legacy IEEE 802.11 wireless networks. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-48r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Skalka, Christian. A Language-Based Approach To Wireless Sensor Network Security. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada597308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!