{"title":"移动无线网络安全——现状、挑战和未来趋势","authors":"S. Sadkhan","doi":"10.1109/IT-ELA52201.2021.9773648","DOIUrl":null,"url":null,"abstract":"Through the development in technology, there is an increasing demand for wireless networks based on IEEE 802.11 protocol that provides a promising coverage area, WiMAX and WiMobile provide a promising future for its mobility, flexibility, and increasing demand to access services from anywhere. Today, cellular technology is developing rapidly, however, when using this technology with special features, The future vulnerabilities can be considered as one of the most important challenges that face the protect. Many methods can be used to solve problems such as encryption, information hiding, hybrid crypto and steganography methods and others. Digital signatures and modern key switching techniques are used in wireless networks for many areas.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Mobile Wireless Network Security - Status, Challenges and Future Trends\",\"authors\":\"S. Sadkhan\",\"doi\":\"10.1109/IT-ELA52201.2021.9773648\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Through the development in technology, there is an increasing demand for wireless networks based on IEEE 802.11 protocol that provides a promising coverage area, WiMAX and WiMobile provide a promising future for its mobility, flexibility, and increasing demand to access services from anywhere. Today, cellular technology is developing rapidly, however, when using this technology with special features, The future vulnerabilities can be considered as one of the most important challenges that face the protect. Many methods can be used to solve problems such as encryption, information hiding, hybrid crypto and steganography methods and others. Digital signatures and modern key switching techniques are used in wireless networks for many areas.\",\"PeriodicalId\":330552,\"journal\":{\"name\":\"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IT-ELA52201.2021.9773648\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IT-ELA52201.2021.9773648","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mobile Wireless Network Security - Status, Challenges and Future Trends
Through the development in technology, there is an increasing demand for wireless networks based on IEEE 802.11 protocol that provides a promising coverage area, WiMAX and WiMobile provide a promising future for its mobility, flexibility, and increasing demand to access services from anywhere. Today, cellular technology is developing rapidly, however, when using this technology with special features, The future vulnerabilities can be considered as one of the most important challenges that face the protect. Many methods can be used to solve problems such as encryption, information hiding, hybrid crypto and steganography methods and others. Digital signatures and modern key switching techniques are used in wireless networks for many areas.