CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Pragmatic security for constrained wireless networks
Authors
Phillip G. Bradford
Benjamin M. Grizzell
Graylin T. Jay
Janet Truitt Jenkins
Publication date
1 January 2007
Publisher
UNA Scholarly Repository
Abstract
© 2007 by Taylor & Francis Group, LLC. This chapter gives a select survey of security issues for constrained wireless networks. This chapter starts with security in the design of constrained devices; it goes on through security issues for classical attacks on constrained wireless devices, and finally it ends with security and the regulatory environment. This high-level view aims to give a different perspective on securing constrained wireless devices. Its focus is on the discussion of pragmatic issues. The main objective of this chapter is to impart an unusually broad understanding of security issues for constrained devices. This chapter does not exhaustively cover security topics; rather it focuses on select issues to allow a substantial breadth of perspective. It is hoped this breadth of perspective will shed light on securing constrained wireless devices
Similar works
Full text
Available Versions
UNA Scholarly Repository
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:ir.una.edu:csis_facpub-100...
Last time updated on 26/11/2020