Skip to main content

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 368 Accesses

Abstract

As computing and networking shift from the static model of the wired Internet toward the new and exciting anytime-anywhere service model of the mobile Internet, information will be gathered by wireless devices and made available to mobile users to consume or process on-the-go. However, wireless security is often cited as a major technical barrier that must be overcome before widespread adoption of such wireless information systems to support a broad array of pervasive applications including emergency rescue and recovery, asset monitoring and tracking, mobile social networks, smart healthcare, and battlefield protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” in Proceedings of the USENIX Security Symposium, 2003, pp. 15–28.

    Google Scholar 

  2. F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access points vulnerabilities to dos attacks in 802.11 networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference, 2004.

    Google Scholar 

  3. D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006.

    Google Scholar 

  4. Q. Li and W. Trappe, “Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks,” in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), September 2006.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yingying Chen .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Yang, J., Chen, Y., Trappe, W., Cheng, J. (2014). Introduction. In: Pervasive Wireless Environments: Detecting and Localizing User Spoofing. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-07356-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07356-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07355-2

  • Online ISBN: 978-3-319-07356-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics