WIRELESS SECURITY
MATTHEW SEXTON, EDWARD SMITH, AND BERNIE EYDT
Booz Allen Hamilton, McLean, Virginia
1 SCIENTIFIC OVERVIEW
Wireless networks have undoubtedly proliferated into many aspects of daily life, both personal and professional. Although many wireless networks exist, ranging from cellular networks to Wireless Fidelity (Wi-Fi), they can be divided into two primary categories: data-centric and voice-centric. Data-centric wireless networks primarily provide extensions of the existing Internet Protocol (IP)-centric networks and evolved from wired IP-centric networks providing security similar to that of wired networks. Voice-centric wireless networks evolved as extensions of the legacy wireline telephony networks and focus security on end user issues, such as cloning, billing fraud, and other forms of subscriber-based attacks. This end user fraud protection focus, although valid for an extension of the wireline voice network, offers weaker security architecture for data services added to the voice network as enhancements to user services.
1.1 Voice-Centric Networks
Security within today’s voice-centric networks has advanced well beyond the rudimentary security provided by first-generation mobile phone services that were mere extensions of the public service telephone network (PSTN). User authentication, voice and data privacy, and assurance of transmitted data are becoming the norm in wireless voice services. Security technologies have evolved as voice and data networks have ...
Get Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.