O'Reilly logo

Fundamentals of Mobile and Pervasive Computing by Loren Schwiebert, Golden Richard III, Sandeep Gupta, Frank Adelstein

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12Wireless Security

This chapter presents problems relating to computer security. We first discuss the traditional problems of security, and then we focus on how mobile and wireless systems introduce some additional problems and make some traditional problems more difficult. We conclude with a discussion of ad hoc networks and electronic commerce. Chapter 13 will describe how these problems are addressed.

12.1 Traditional Security Issues

In this section we present the traditional security criteria. While these apply to nonmobile computing as well, they are important for mobile computing not only because the same risks are present but also because certain properties of mobile computing increase some of these risks, such as eavesdropping ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required