Security Analysis of Wireless Modulation Techniques

    Date12 Jun 2006
    7065
    Posted ByBrittany Day
    The world of computer networking has forever been impacted by the infiltration of wireless technologies. From simple home networks utilizing a single wireless router or access point to an extravagant wide area network composing of thousands of servers and associated supporting hardware and software, wireless technologies exist in almost every facet imaginable. Some are simple exploitations of wireless technology, such as a wireless mouse, while others, like the wireless router, use the latest techniques wireless has to offer.

    In the early days of wireless communications, privacy and security of the information being communicated was not the top priority of engineers. They had more important issues to contend with, such as simply transferring the voice or data information from the transmitter to the receiver in an intelligible manner. Since radio electronics in general was in its infancy, this was a huge task to effectively master with current technology. Range, intelligibility, and interference were issues that neededimmediate attention. Many times, voice or Morse code transmissions were hidden in a bed of static or noise so severe that successful reception was impossible. Efforts were in high demand to discover new ways to transmit radio waves in a much more effective manner.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Have you used our RSS feeds?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    21
    radio
    [{"id":"77","title":"Yes, for articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"78","title":"Yes, for advisories","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"79","title":"Hybrid that contains both","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"80","title":"No","votes":"0","type":"x","order":"4","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.