Optimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Devices
()
Currently unavailable
Currently unavailable
About this ebook
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance.
Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.
- The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices
Related to Optimizing IEEE 802.11i Resource and Security Essentials
Related ebooks
Smart Grid Security: Innovative Solutions for a Modernized Grid Rating: 0 out of 5 stars0 ratingsOpen Radio Access Network (O-RAN) Systems Architecture and Design Rating: 0 out of 5 stars0 ratingsNetwork Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools Rating: 0 out of 5 stars0 ratingsManaging Information Security Rating: 0 out of 5 stars0 ratingsMobile WiMAX: A Systems Approach to Understanding IEEE 802.16m Radio Access Technology Rating: 0 out of 5 stars0 ratingsMachine Learning for Future Fiber-Optic Communication Systems Rating: 0 out of 5 stars0 ratingsRIoT Control: Understanding and Managing Risks and the Internet of Things Rating: 5 out of 5 stars5/5Internet of Things: Principles and Paradigms Rating: 4 out of 5 stars4/5Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Rating: 0 out of 5 stars0 ratingsLPWAN Technologies for IoT and M2M Applications Rating: 0 out of 5 stars0 ratingsSafety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP Rating: 0 out of 5 stars0 ratingsDeploying Wireless Sensor Networks: Theory and Practice Rating: 5 out of 5 stars5/55G Core Networks: Powering Digitalization Rating: 5 out of 5 stars5/5Managing the Web of Things: Linking the Real World to the Web Rating: 0 out of 5 stars0 ratingsCyber-Assurance for the Internet of Things Rating: 0 out of 5 stars0 ratingsComputational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications Rating: 0 out of 5 stars0 ratingsIndustrial Network Security, Second Edition Rating: 3 out of 5 stars3/5The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic Rating: 4 out of 5 stars4/5Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development Rating: 5 out of 5 stars5/5Reliability Assurance of Big Data in the Cloud: Cost-Effective Replication-Based Storage Rating: 5 out of 5 stars5/5Wireless Networks for Industrial Automation, Fourth Edition Rating: 0 out of 5 stars0 ratingseMaintenance: Essential Electronic Tools for Efficiency Rating: 0 out of 5 stars0 ratingsSecurity and Resilience in Intelligent Data-Centric Systems and Communication Networks Rating: 0 out of 5 stars0 ratingsBio-Inspired Computation in Telecommunications Rating: 0 out of 5 stars0 ratingsOpto-mechanical Fiber Optic Sensors: Research, Technology, and Applications in Mechanical Sensing Rating: 0 out of 5 stars0 ratingsModeling, Operation, and Analysis of DC Grids: From High Power DC Transmission to DC Microgrids Rating: 0 out of 5 stars0 ratingsWireless and Mobile Network Security Rating: 0 out of 5 stars0 ratingsOvercurrent Relay Advances for Modern Electricity Networks Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Destination CISSP Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5
Reviews for Optimizing IEEE 802.11i Resource and Security Essentials
0 ratings0 reviews