12.1 Traditional Security Issues12.1.1 Integrity12.1.2 Confidentiality12.1.3 Nonrepudiation12.1.4 Availability12.2 Mobile and Wireless Security Issues12.2.1 Detectability12.2.2 Resource depletion/exhaustion12.2.3 Physical intercept problems12.2.4 Theft of service12.2.5 War driving/walking/chalking12.3 Mobility12.4 Problems in Ad Hoc Networks12.4.1 Routing12.4.2 Prekeying12.4.3 Reconfiguring12.4.4 Hostile environment12.5 Additional Issues: Commerce12.5.1 Liability12.5.2 Fear, uncertainty, and doubt12.5.3 Fraud12.5.4 Big bucks at stake12.6 Additional Types of Attacks12.6.1 "Man in the middle" attacks12.6.2 Traffic analysis12.6.3 Replay attacks12.6.4 Buffer-overflow attacks12.7 Summary