Abstract
The advancement of wireless technologies allows us to share information gathered by wireless devices and makes it available to users to consume or process on-the-go. However, the security of the underlying wireless networks is a major hurdle that needs to be overcome in order to achieve the successful and widespread deployment of pervasive wireless networks supported by the vast array of emerging wireless technologies. This book is focused on enhancing wireless security by exploiting spatial correlation information to enhance wireless security in pervasive wireless environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 The Author(s)
About this chapter
Cite this chapter
Yang, J., Chen, Y., Trappe, W., Cheng, J. (2014). Conclusions and Future Work. In: Pervasive Wireless Environments: Detecting and Localizing User Spoofing. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-07356-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-07356-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07355-2
Online ISBN: 978-3-319-07356-9
eBook Packages: Computer ScienceComputer Science (R0)