Abstract

As wireless technologies are increasingly integrated into our lives, the security vulnerabilities are increasingly important. From the now ubiquitous remote keyless entry in our cars to contactless payment systems, these systems are ingrained into daily activities. With new technologies, come new opportunities for criminals — especially clever criminals. This paper examines various wireless technologies, how they have been exploited, and current and future solutions to these exploits. The examination of these technologies and exploits is through the prism of case studies. These case studies are examinations of technologies that are familiar and should assist the reader in understanding how and why these security vulnerabilities exist and how they may be ameliorated.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call