Skip to main content

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 361 Accesses

Abstract

The advancement of wireless technologies allows us to share information gathered by wireless devices and makes it available to users to consume or process on-the-go. However, the security of the underlying wireless networks is a major hurdle that needs to be overcome in order to achieve the successful and widespread deployment of pervasive wireless networks supported by the vast array of emerging wireless technologies. This book is focused on enhancing wireless security by exploiting spatial correlation information to enhance wireless security in pervasive wireless environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yingying Chen .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Yang, J., Chen, Y., Trappe, W., Cheng, J. (2014). Conclusions and Future Work. In: Pervasive Wireless Environments: Detecting and Localizing User Spoofing. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-07356-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07356-9_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07355-2

  • Online ISBN: 978-3-319-07356-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics