
Optimizing IEEE 802.11i Resource and Security Essentials
For Mobile and Stationary Devices
- 72 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Optimizing IEEE 802.11i Resource and Security Essentials
For Mobile and Stationary Devices
About this book
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wiredcomputer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentialsis to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance.Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations.Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.- The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Introduction
Abstract
Keywords
1.1. Introduction
1.2. Problem background
1.3. Problem statement
1.4. Purpose of the study
1.5. Objectives of the study
Table of contents
- Cover
- Title page
- Table of Contents
- Copyright
- Abstract
- List of Abbreviations
- Chapter 1: Introduction
- Chapter 2: Literature Review
- Chapter 3: Research Methodology
- Chapter 4: Design and Implementation for Mobile Devices
- Chapter 5: Conclusion
- References