| Wireless communications are becoming ubiquitous in homes, offices, and enterprises with the popular IEEE 802.11 wireless LAN technology and the up-andcoming IEEE 802.16 wireless MAN technology. The wireless nature of communications defined in these standards makes it possible for an attacker to snoop on confidential communications or modify them to gain access to home or enterprise networks much more easily than with wired networks.
The 802.11 and 802.16 standards considered wired equivalency and secure access as important in the original design itself. Unfortunately, efficiency considerations seem to have sidelined security as a “nice-to-have” component, whereas a “must implement cautiously” specification would have been more appropriate considering the potential threats. To be sure, strong security seems sometimes overly burdensome in terms of both computational as well communication overhead.
Wireless devices generally try to reduce computation overhead to conserve power and communication overhead to conserve spectrum and battery power. Due to these considerations, the original security designs in wireless LANs and MANs used smaller keys, weak message integrity protocols, weak or one-way authentication protocols, and so forth. As wireless networks became popular, the security threats were also highlighted to caution users. A security protocol redesign followed first in wireless LANs and then in wireless MANs.
This book discusses the security threats and requirements in wireless LANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols. It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues. |
|
|
Machine Learning with R
Learn how to use R to apply powerful machine learning methods and gain an insight into real-world applications
Overview
-
Harness the power of R for statistical computing and data science
-
Use R to apply common machine learning algorithms with real-world applications
-
Prepare,...
| | The Lean Extended Enterprise: Moving Beyond the Four Walls to Value Stream ExcellenceKEY FEATURES
- Demonstrates how to integrate Lean, Six Sigma, Kaizen, and enabling technologies such as SCM, APS, PLM, CRM, ERP, networks, exchanges and portals into a total business improvement initiative to achieve huge breakthroughs in performance
- Illustrates how to develop, organize, launch, and lead a...
| | Frommer's Portugal (Frommer's Complete)
Centuries ago, Portugal was a pioneer of worldwide exploration. Until recently, however, it was never as successful in attracting visitors to its own shores. Outside of greater Lisbon, the Algarve, and the island of Madeira, Portugal remained unknown and undiscovered by the mainstream visitor for many decades.
Today’s... |
Cultural Mythology and Global Leadership`This fascinating collection of local mythology shows how widely leadership models differ across nations, and how deeply these differences are rooted. True global leadership is based on empathy with local variety.' - Geert Hofstede, Maastricht University, The Netherlands, author of Culture's Consequences: Comparing Values, Behaviors,... | | Speed Math for Kids: The Fast, Fun Way To Do Basic CalculationsI could have called this book Fun with Speed Mathematics. It contains some of the same material as my other books and teaching materials. It also includes additional methods and applications based on the strategies taught in Speed Mathematics that, I hope, give more insight into the mathematical principles and encourage creative thought. I have... | | 3D Programming for Windows (Pro - Developer)The Windows Presentation Foundation is a key component of .NET Framework 3.0, which is a part of Windows Vista and available for Windows XP. With the Windows Presentation Foundation, 3D images can be displayed regardless of the video-display hardware on the users machine. Focusing on developing user interface objects or simple animations, this book... |
|