Wireless Security Fundamentals
Introduction
One thing underlies all the rosy predictions about mobile commerce and ubiquitous wireless data networks: the assumption that data can be stored securely on devices, encrypted successfully over the air, and handled equally securely on the server. Unfortunately, however, rarely a month goes by when a researcher doesn't find a new security hole in a wireless technology being touted as the next great wireless economic engine. Because of the processing, memory, and battery-life requirements of mobile devices, traditional encryption techniques (which sometimes rely on powerful processors and large amounts of memory) also fall flat on wireless platforms, creating the need for wireless-specific security technologies. In this article, I'll discuss some of these security technologies as well as some of the problems that have been uncovered to date.