58 Percent Secure: Why Do So Many Wireless Networks Not Use Encryption?
Glen W. SagersBryan HosackPublished in: AMCIS (2009)
Keyphrases
- wireless networks
- key management
- ad hoc networks
- key exchange
- encryption scheme
- data encryption
- wireless communication
- base station
- security analysis
- mobile wireless
- wifi
- wireless networking
- advanced encryption standard
- multi hop
- mobile networks
- cellular networks
- routing algorithm
- wireless ad hoc networks
- wireless mesh networks
- wireless transmission
- mobile computing
- low bandwidth
- cross layer
- access points
- network coding
- multimedia services
- link layer
- resource constrained
- security requirements
- data transmission
- wireless technologies
- mobile ipv
- security protocols
- video delivery
- secret key
- mobile phone