The issues related to network data security were identified shortly after the inception of the first wired network. Initial protocols relied heavily on obscurity as the main tool for security provisions. Hacking into a wired network requires physically tapping into the wire link on which the data is being transferred. Both these factors seemed to work hand in hand and made secured communication somewhat possible using simple protocols. Then came the wireless network which radically changed the field and associated environment. How do you secure something that freely travels through the air as a medium? Furthermore, wireless technology empowered devices to be mobile, making it harder for security protocols to identify and locate a malicious device in the network while making it easier for hackers to access different parts of the network while moving around. Quite often, the discussion centered on the question: Is it even possible to provide complete security in a wireless network? It can be debated that wireless networks and perfect data security are mutually exclusive. Availability of latest wideband wireless technologies have diminished predominantly large gap between the network capacities of a wireless network versus a wired one. Regardless, the physical medium limitation still exists for a wired network. Hence, security is a way more complicated and harder goal to achieve for a wireless network (Imai, Rahman, & Kobara, 2006). So, it can be safely assumed that a security protocol that is robust for a wireless network will provide at least equal if not better level of security in a similar wired network. Henceforth, we will talk about security essentially in a wireless network and readers should assume it to be equally applicable to a wired network.
Wearable technology is rapidly changing the way we associate objects with our surroundings, and how we interact with the objects. As technology becomes more commonplace in our surroundings, our lives are rendered more vulnerable. As technology becomes more sophisticated, our interaction with it seems to become progressively minimalistic. This chapter introduces techniques wherein secure communication between humans and their surrounding devices can be facilitated by applying human physiological information as the identifying factor. Different biometric techniques are investigated, and the rationale behind their applicability is argued. Additionally, the benefits and possible use-cases for each technique is presented, and the associated open research problems are brought to light.
Wearable technology is rapidly changing the way we associate objects with our surroundings, and how we interact with the objects. As technology becomes more commonplace in our surroundings, our lives are rendered more vulnerable. As technology becomes more sophisticated, our interaction with it seems to become progressively minimalistic. This chapter introduces techniques wherein secure communication between humans and their surrounding devices can be facilitated by applying human physiological information as the identifying factor. Different biometric techniques are investigated, and the rationale behind their applicability is argued. Additionally, the benefits and possible use-cases for each technique is presented, and the associated open research problems are brought to light.
The issues related to network data security were identified shortly after the inception of the first wired network. Initial protocols relied heavily on obscurity as the main tool for security provisions. Hacking into a wired network requires physically tapping into the wire link on which the data is being transferred. Both these factors seemed to work hand in hand and made secured communication somewhat possible using simple protocols. Then came the wireless network which radically changed the field and associated environment. How do you secure something that freely travels through the air as a medium? Furthermore, wireless technology empowered devices to be mobile, making it harder for security protocols to identify and locate a malicious device in the network while making it easier for hackers to access different parts of the network while moving around. Quite often, the discussion centered on the question: Is it even possible to provide complete security in a wireless network? It can be debated that wireless networks and perfect data security are mutually exclusive. Availability of latest wideband wireless technologies have diminished predominantly large gap between the network capacities of a wireless network versus a wired one. Regardless, the physical medium limitation still exists for a wired network. Hence, security is a way more complicated and harder goal to achieve for a wireless network (Imai, Rahman, & Kobara, 2006). So, it can be safely assumed that a security protocol that is robust for a wireless network will provide at least equal if not better level of security in a similar wired network. Henceforth, we will talk about security essentially in a wireless network and readers should assume it to be equally applicable to a wired network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.