Wireless Networks Cyber Security Threats and Countermeasures

El Hajjar, A. and Jahankhani, H. El Hajjar, A. and Jahankhani, H. (ed.) 2023. Wireless Networks Cyber Security Threats and Countermeasures. Switzerland Springer.

TitleWireless Networks Cyber Security Threats and Countermeasures
TypeScholarly edition
AuthorsEl Hajjar, A. and Jahankhani, H.
EditorsEl Hajjar, A. and Jahankhani, H.
Abstract

In recent years, wireless network communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats.

This book addresses some of these challenges, focusing on the implications, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicious use of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security.

The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master’s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

KeywordsDigital Forensics
Network Security
Information Security
Wireless Networks
Artificial Intelligence
5G & 6G Security
Cyber Threat Intelligence
IoT Security
Cryptography for Low Power Devices
Year2023
PublisherSpringer
Publication dates
Published23 Aug 2023
Place of publicationSwitzerland
Edition1st
SeriesAdvanced Sciences and Technologies for Security Applications
ISBN9783031336331
9783031336317
9783031336300
ISSN1613-5113
2363-9466
Digital Object Identifier (DOI)https://doi.org/10.1007/978-3-031-33631-7

Related outputs

Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations
El Hajjar, A. 2023. Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations. in: Wireless Networks: Cyber Security Threats and Countermeasures Switzerland Springer. pp. 1-42

A proactive approach to protect cloud computing environment against DDoS attack
Md. Mamun Ahmed and Ayman El Hajjar 2023. A proactive approach to protect cloud computing environment against DDoS attack. in: Hamid Jahankhani, Arshad Jamal and Guy Brown (ed.) AI, Blockchain and Self-Sovereign Identity in Higher Education Switzerland Springer. pp. 243-278

Secure routing in IoT networks with SISLOF
El Hajjar, A.E., Roussos, G. and Paterson, M. 2017. Secure routing in IoT networks with SISLOF. 2017 Global Internet of Things Summit (GIoTS). CICG, Geneva 06 - 09 Jun 2017 IEEE . https://doi.org/10.1109/giots.2017.8016278

Secure routing in IoT networks with SISLOF
El Hajjar, A., Roussos, G. and Paterson, M. 2017. Secure routing in IoT networks with SISLOF. Global IoT Summit. Geneva, Switzerland 06 - 09 Jun 2017 IEEE . https://doi.org/10.1109/GIOTS.2017.8016278

Securing the internet of things devices using pre-distributed keys
El Hajjar, A. 2016. Securing the internet of things devices using pre-distributed keys. 2016 IEEE International Conference on Cloud Engineering Workshops (IC2EW). Berlin, Germany 04 - 08 Apr 2016 IEEE . https://doi.org/10.1109/ic2ew.2016.22

Securing the Internet of Things Devices Using Pre-Distributed Keys
El Hajjar, A. 2016. Securing the Internet of Things Devices Using Pre-Distributed Keys. 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). Berlin, Germany 04 - 08 Apr 2016 IEEE . https://doi.org/10.1109/IC2EW.2016.22

On the Performance of Key Pre-distribution for RPL-based IoT Networks
El Hajjar, A., Roussos, G. and Paterson, M. 2016. On the Performance of Key Pre-distribution for RPL-based IoT Networks. Interoperability, Safety and Security in IoT. Paris, France 26 - 27 Oct 2016 Springer. https://doi.org/10.1007/978-3-319-52727-7_9

Permalink - https://westminsterresearch.westminster.ac.uk/item/w67vw/wireless-networks-cyber-security-threats-and-countermeasures


Share this

Usage statistics

28 total views
0 total downloads
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.