2004
DOI: 10.1016/s0267-3649(04)00081-0
|View full text |Cite
|
Sign up to set email alerts
|

Security in data communications: Security in Fixed and Wireless Networks – An introduction to securing data communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 0 publications
0
16
0
Order By: Relevance
“…• Security and privacy: Security in general and wireless security in particular are vast research topics [15], security aspects for industrial networks are discussed in [16]. A brief account on some issues is provided in Section II-B.…”
Section: Overview On Research Areas For Wireless Industrial Netwomentioning
confidence: 99%
See 3 more Smart Citations
“…• Security and privacy: Security in general and wireless security in particular are vast research topics [15], security aspects for industrial networks are discussed in [16]. A brief account on some issues is provided in Section II-B.…”
Section: Overview On Research Areas For Wireless Industrial Netwomentioning
confidence: 99%
“…There are many techniques to protect a network against attackers from outside, for example firewalls [15]. But when the network uses wireless transmission, an attacker that is close enough to the network can eavesdrop, it can insert malicious packets, or it can simply jam the wireless medium and distort any other transmission, this way challenging reliable and timely transmission.…”
Section: B Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Just like the previously mentioned stunnel, can the Secure SHell (SSH) protocol also create tunnels for higher layer applications by implementing a connection specific port forwarding [22]. Due to the use of TCP SSH is also not suited for the transport of delay critical data and usually not considered for realizing generic VPNs.…”
Section: Other Cryptographic Schemesmentioning
confidence: 99%