2015 | OriginalPaper | Chapter
Security in Wireless Networks and Devices
Author : Joseph Migga Kizza
Published in: Guide to Computer Network Security
Publisher: Springer London
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
It is not feasible to discuss security in wireless networks without a thorough understanding of the working of wireless devices and networks. In fact, as we first set out to teach the computer network infrastructure in Chap.
1
in order to teach network security, we are going, in the first parts of this chapter, to discuss the wireless network infrastructure. As was the case in Chap.
1
, it is not easy to discuss a network infrastructure in a few paragraphs and expect a reader to feel comfortable enough to deal with the security issues based on the infrastructure. So, although we are promising the reader to be brief, our discussion of the wireless infrastructure may seem long to some readers and sometimes confusing to others. Bear with us as we dispose of the necessary theory for a good understanding of wireless security.