Sensor Networks for Emergency Response: Challenges and Opportunities
Journal: International Journal of Computer Techniques (Vol.4, No. 6)Publication Date: 2017-11-01
Authors : R.Karthikeyan Shanmugapriya M Indhu P;
Page : 52-58
Keywords : Blue Tooth; WEP;
Abstract
Wireless networking is inherently insecure. From jamming to eavesdropping, from man-in the middle to spoofing, there are a variety of attack methods that can be used against the users of wireless networks. Modern wireless data networks use a variety of cryptographic techniques such as encryption and authentication to provide barriers to such infiltrations. An overview of the advantages that wireless networks have over wired technology is then given. The paper also advances some of the major security risks that wireless networks face. It is at such security holes that the information criminals tend to attack. In this paper, we identify the various security related challenges faced by wireless protocols. This study is useful as it provides lessons for ICT managers, directors, academia and organizations, who wish to develop install or are already using wireless networks within their offices.
Other Latest Articles
- Assessment of Efficiency of Part & Geometry Models for Groupwise Registration
- Kids EduLink - Android application to provide extra knowledge for kids based on the Local Syllabus
- A Survey on Techniques and Applications of Data mining in Banking Field
- Discrete Cosine Transform DCT Methods on Compression RGB and Grayscale image
- Towards a Skill-oriented Educational Scenario: Vocational Training as Use Case
Last modified: 2018-05-19 13:57:23