Pragmatic security for constrained wireless networks
© 2007 by Taylor & Francis Group, LLC. This chapter gives a select survey of security issues for constrained wireless networks. This chapter starts with security in the design of constrained devices; it goes on through security issues for classical attacks on constrained wireless devices, and finally it ends with security and the regulatory environment. This high-level view aims to give a different perspective on securing constrained wireless devices. Its focus is on the discussion of pragmatic issues. The main objective of this chapter is to impart an unusually broad understanding of security issues for constrained devices. This chapter does not exhaustively cover security topics; rather it focuses on select issues to allow a substantial breadth of perspective. It is hoped this breadth of perspective will shed light on securing constrained wireless devices.
Security in Distributed, Grid, Mobile, and Pervasive Computing
Bradford, P., Grizzell, B., Jay, G., & Jenkins, J. (2007). Pragmatic security for constrained wireless networks. Security in Distributed, Grid, Mobile, and Pervasive Computing. Retrieved from https://ir.una.edu/csis_facpub/9