System design methodologies for a wireless security processing platform
Proceedings of the 39th annual Design Automation Conference
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Embedding Security in Wireless Embedded Systems
VLSID '03 Proceedings of the 16th International Conference on VLSI Design
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
WLAN Security: Current and Future
IEEE Internet Computing
Emerging challenges in designing secure mobile appliances
Ambient intelligence
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
International Journal of Web and Grid Services
International Journal of Mobile Communications
Secure access of smart cards using elliptic curve cryptosystems
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Security for mobile low power nodes in a personal area network by means of trusted platform modules
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Wireless health and the smart phone conundrum
ACM SIGBED Review - Special Issue on the 2nd Joint Workshop on High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability
Hi-index | 4.10 |
Increasingly, companies and individuals are using wireless technology for important communications they want to keep private, such as mobile e-commerce transactions, email, and corporate data transmissions. At the same time, as wireless platforms mature, grow in popularity, and store valuable information, hackers are stepping up their attacks on these new targets. This is a particular problem because wireless devices, including smart cellular phones and personal digital assistants (PDAs) with Internet access, were not originally designed with security as a top priority. Now, however, wireless security is becoming an important area of product research and development. As in the wired world, wireless security boils down to protecting information and preventing unauthorized system access. However, it is challenging to implement security in small-footprint devices with low processing power and small memory capacities and that use unreliable, low bandwidth wireless networks. Vendors and others have developed several security approaches for the various wireless technologies, although each of these early efforts has some shortcomings. Security researchers are thus busy developing new technologies and fixing holes in existing ones. The paper discusses wireless security technology and its shortcomings