In addition to these general principles regarding the protection of sensitive
information, there are some additional factors which are only present in wireless
communication security. The first consideration is that eavesdropping on a
wireless communication can be performed without having to break into a secure
location. Secondly, it is very difficult to determine if a wireless transmission is
being received by an unauthorized person. And thirdly, it is very difficult to trace
who may be receiving the transmission.
The factors discussed above, do not make wireless communication less secure,
but there is less risk to those attempting to steal proprietary information of being
caught and prosecuted. In some countries, it is seen as incumbent upon owners
of information to take steps to provide adequate security to protect sensitive
information. This means that a potential industrial spy must defeat some kind of
security system and in doing so the act becomes illegal. If there is no security
system, then information may be seen as public domain and no criminal act has
occurred. In other legal systems it may not be illegal to listen or decode
transmitted information, but using that information for personal gain or passing it
on to a third party may be a criminal offense. The laws relating to the ownership
of information is are varied and complex and become even more convoluted if
information is transmitted across national boundaries.
The answer in all cases of sending sensitive information from one place to
another, is to provide adequate protection. In the case of transmission of
electronic information this will normally mean encryption. As discussed in 6.1.5,
“Security” on page 124, encryption should be used on the whole length of data
path, and not just on the wireless interface. Modulation techniques,
compression, packetization and spread spectrum, all make it more difficult to
decode a data transmission. However, these technologies are all commercially
available and do not guarantee that the data cannot be retrieved by
unauthorized persons.
In summary, the security aspects of wireless transmission are not fundamentally
any different to other transmission methods. If sensitive information is sent
outside a secure environment, it must be protected.
8.8 Benefits
Some of the more obvious benefits of using wireless communications have been
mentioned in previous chapters. It is appropriate to bring these benefits and
less obvious ones together in one section where those people who are
considering using wireless to enhance business processes and improve
everyday life can quantify the effect.
The benefit that probably comes to mind first of all is that of mobility. The user
of wireless services is not tied to a single location and can travel around while
still staying in touch with people and services as required. At first sight it may
not be apparent that many people have need for this kind of mobility in their
daily lives, but it is certain that every enterprise has a least some of its workers
who are mobile. Mobility can be defined in many ways; from the needs of a
world traveler in many different countries and remote regions, to the office
worker who has stepped out of his office to converse with a colleague, and thus
misses an important phone call. Wireless solutions can address both of these
needs together with a vast range of voice and data requirements in between.
Analog and digital cellular phone networks, PCN/PCS networks, cordless
phones, satellite communications, RF or infrared LANs, paging systems, mobile
148 An Introduction to Wireless Technology

Get An Introduction to Wireless Technology, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.