1,348 research outputs found
An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations
With the expansion of wireless sensor networks (WSNs), the need for securing
the data flow through these networks is increasing. These sensor networks allow
for easy-to-apply and flexible installations which have enabled them to be used
for numerous applications. Due to these properties, they face distinct
information security threats. Security of the data flowing through across
networks provides the researchers with an interesting and intriguing potential
for research. Design of these networks to ensure the protection of data faces
the constraints of limited power and processing resources. We provide the
basics of wireless sensor network security to help the researchers and
engineers in better understanding of this applications field. In this chapter,
we will provide the basics of information security with special emphasis on
WSNs. The chapter will also give an overview of the information security
requirements in these networks. Threats to the security of data in WSNs and
some of their counter measures are also presented
Wireless Telecommunications Issues: Cell Phone TV, Wireless Networks in Disaster Management, Ubiquitous Computing, and Adoption of Future Wireless Applications
This paper is a summary of a 2007 Association for Information Systems Americas Conference on Information Systems (AMCIS) panel discussion regarding current mobile wireless issues and technologies. The invited panelists are four faculty members specializing in information systems from the United States. The covered topics included cell phone TV and misconceptions surrounding it, wireless networks in disaster management, ubiquitous computing including anatomy of a mote and sensors, and the adoption of future wireless applications. First, we present wireless cell phone TV as a functioning multipurpose computer, or a Swiss army knife, of media devices. The misconceptions are stated, influenced by preconceived notions by the media critics as well as users. Next we discuss a range of wireless technologies including wearable computing, ad hoc and mesh wireless networks as a means of providing communications for first respondents during a natural or man-made disaster. Then we examine the anatomy of motes and RFIDs, including sensors, in an era of ubiquitous computing and a world of (inter-)connected objects. Finally, we discuss the socio-cultural constructs impacting users\u27 intentions to adopt future wireless applications
- …