1,348 research outputs found

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    Wireless Telecommunications Issues: Cell Phone TV, Wireless Networks in Disaster Management, Ubiquitous Computing, and Adoption of Future Wireless Applications

    Get PDF
    This paper is a summary of a 2007 Association for Information Systems Americas Conference on Information Systems (AMCIS) panel discussion regarding current mobile wireless issues and technologies. The invited panelists are four faculty members specializing in information systems from the United States. The covered topics included cell phone TV and misconceptions surrounding it, wireless networks in disaster management, ubiquitous computing including anatomy of a mote and sensors, and the adoption of future wireless applications. First, we present wireless cell phone TV as a functioning multipurpose computer, or a Swiss army knife, of media devices. The misconceptions are stated, influenced by preconceived notions by the media critics as well as users. Next we discuss a range of wireless technologies including wearable computing, ad hoc and mesh wireless networks as a means of providing communications for first respondents during a natural or man-made disaster. Then we examine the anatomy of motes and RFIDs, including sensors, in an era of ubiquitous computing and a world of (inter-)connected objects. Finally, we discuss the socio-cultural constructs impacting users\u27 intentions to adopt future wireless applications
    • …
    corecore