Change search
ReferencesLink to record
Permanent link

Direct link
Security Issues in Wireless Systems
Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
2009 (English)Independent thesis Advanced level (degree of Master (One Year))Student thesis
Abstract [en]

ireless Communication is one of the fields of Telecommunications which is growing with the tremendous speed. With the passage of time wireless communication devices are becoming more and more common. It is not only the technology of business but now people are using it to perform their daily tasks, be it for calling, shopping, checking their emails or transfer their money. Wireless communication devices include cellular phones, cordless phones and satellite phones, smart phones like Personal Digital Assistants (PDA), two way pagers, and lots of their devices are on their way to improve this wireless world. In order to establish two way communications, a wireless link may be using radio waves or Infrared light. The Wireless communication technologies have become increasingly popular in our everyday life. The hand held devices like Personal Digital Assistants (PDA) allow the users to access calendars, mails, addresses, phone number lists and the internet. Personal digital assistants (PDA) and smart phones can store large amounts of data and connect to a broad spectrum of networks, making them as important and sensitive computing platforms as laptop PCs when it comes to an organization’s security plan. Today’s mobile devices offer many benefits to enterprises. Mobile phones, hand held computers and other wireless systems are becoming a tempting target for virus writers. Mobile devices are the new frontier for viruses, spam and other potential security threats. Most viruses, Trojans and worms have already been created that exploit vulnerabilities. With an increasing amount of information being sent through wireless channels, new threats are opening up. Viruses have been growing fast as handsets increasingly resemble small computers that connect with each other and the internet. Hackers have also discovered that many corporate wireless local area networks (WLAN) in major cities were not properly secured. Mobile phone operators say that it is only a matter of time before the wireless world is hit by the same sorts of viruses and worms that attack computer software.

Place, publisher, year, edition, pages
2009. , 50 p.
Keyword [en]
TSjm, GU5
National Category
Mathematical Analysis Discrete Mathematics Telecommunications
URN: urn:nbn:se:bth-6180Local ID: diva2:833609
Physics, Chemistry, Mathematics
00923006458457Available from: 2015-04-22 Created: 2009-07-19 Last updated: 2015-06-30Bibliographically approved

Open Access in DiVA

fulltext(426 kB)281 downloads
File information
File name FULLTEXT01.pdfFile size 426 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
Department of Telecommunication Systems
Mathematical AnalysisDiscrete MathematicsTelecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 281 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 384 hits
ReferencesLink to record
Permanent link

Direct link