Pragmatic security for constrained wireless networks

Document Type


Publication Date



© 2007 by Taylor & Francis Group, LLC. This chapter gives a select survey of security issues for constrained wireless networks. This chapter starts with security in the design of constrained devices; it goes on through security issues for classical attacks on constrained wireless devices, and finally it ends with security and the regulatory environment. This high-level view aims to give a different perspective on securing constrained wireless devices. Its focus is on the discussion of pragmatic issues. The main objective of this chapter is to impart an unusually broad understanding of security issues for constrained devices. This chapter does not exhaustively cover security topics; rather it focuses on select issues to allow a substantial breadth of perspective. It is hoped this breadth of perspective will shed light on securing constrained wireless devices.

Publication Title

Security in Distributed, Grid, Mobile, and Pervasive Computing

This document is currently not available here.