ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Sensor Networks for Emergency Response: Challenges and Opportunities

Journal: International Journal of Computer Techniques (Vol.4, No. 6)

Publication Date:

Authors : ;

Page : 52-58

Keywords : Blue Tooth; WEP;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless networking is inherently insecure. From jamming to eavesdropping, from man-in the middle to spoofing, there are a variety of attack methods that can be used against the users of wireless networks. Modern wireless data networks use a variety of cryptographic techniques such as encryption and authentication to provide barriers to such infiltrations. An overview of the advantages that wireless networks have over wired technology is then given. The paper also advances some of the major security risks that wireless networks face. It is at such security holes that the information criminals tend to attack. In this paper, we identify the various security related challenges faced by wireless protocols. This study is useful as it provides lessons for ICT managers, directors, academia and organizations, who wish to develop install or are already using wireless networks within their offices.

Last modified: 2018-05-19 13:57:23