Wireless security Book Chapter

Kaleem, F, Yen, KK. (2011). Wireless security . 17-45. 10.4018/978-1-61350-507-6.ch002

cited authors

  • Kaleem, F; Yen, KK

authors

abstract

  • As the portability and accessibility of mobile devices have grown over the last decade, applications of wireless communication technologies have become more prevalent. Mature technologies such as WiFi, Bluetooth, and GSM (Global System for Mobile Communication) cellular wireless and emerging technologies such as WiMax are becoming commonplace in both the business and consumer world. As such, it is extremely important to understand the security considerations and vulnerabilities in order to ensure that these technologies are as reliable and secure as possible. Since the communication medium in wireless technologies, as compared to the wired medium, are "invisible airwaves", the security vulnerabilities and threats may be less obvious, resulting in individuals and organizations with no or low awareness of the associated risk of their wireless infrastructure and technology. The purpose of this chapter is to educate individuals about the inherent security risks and vulnerabilities of common and emerging wireless technologies and to provide them with some of the best practices used in securing or minimizing these associated risks. © 2012, IGI Global.

publication date

  • December 1, 2011

Digital Object Identifier (DOI)

International Standard Book Number (ISBN) 13

start page

  • 17

end page

  • 45