TITLE

Without Wires

PUB. DATE
January 2005
SOURCE
Security: Solutions for Enterprise Security Leaders;Jan2005, Vol. 42 Issue 1, p16
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses wireless communication system installed in the Municipal airport of Renton. Municipal airport of Renton, Washington., where Boeing Co. shares an aircraft production facility, the operation needed a new access control system. The production plant needed to upgrade the electric and pedestrian gate system providing access to the aircraft operation area as part of major security upgrade project. The equipment included wireless reader interfaces , Panel Interface Modules. After working out a few bugs, the system has operated flawlessly. The wireless system has saved the airport hundreds of staff hours by linking all of the vehicle gates and allowing manipulation of one or all gates with a click of the mouse button.
ACCESSION #
15543078

 

Related Articles

  • Competitive throughput in multi-hop wireless networks despite adaptive jamming. Richa, Andrea; Scheideler, Christian; Schmid, Stefan; Zhang, Jin // Distributed Computing;Jun2013, Vol. 26 Issue 3, p159 

    This article presents a simple local medium access control protocol, called Jade, for multi-hop wireless networks with a single channel that is provably robust against adaptive adversarial jamming. The wireless network is modeled as a unit disk graph on a set of nodes distributed arbitrarily in...

  • Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Gope, Prosanta; Hwang, Tzonelih // Wireless Personal Communications;Jun2015, Vol. 82 Issue 4, p2231 

    Rapid development of wireless networks brings about many security problems in mobile communications. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users is indeed a challenging task. Recently, Wen et al. proposed such scheme, which is...

  • Key Technologies for distributed wireless networking and ECMA-368 MAC Layers LSI design challenges. Sakoda, Kazuyuki; Morioka, Yuichi; Fujita, Chihiro; Tanimoto, Erica; Nishikawa, Kenzoh; Suzuki, Mitsuhiro // International Journal of Computer Networks & Communications;2010, Vol. 2 Issue 1, p1 

    Distributed wireless networking enables opportunistic operation of personal area networks (PANs). In PAN scenario, it is desirable that each device can establish a wireless connection among devices near by, without a help of access point (AP) or central coordinator. Distributed Media Access...

  • Towards Awareness of Privacy and Quality of Context in Context-Based Access Control for Ubiquitous Applications. Bringel Filho, José; Martin, Hervé // Journal of Digital Information Management;Aug2009, Vol. 7 Issue 4, p219 

    The growing advancement of wireless communication technologies, mobiles devices, and sensors enable new opportunities for users to share resources anytime and anywhere, making access control a critical concern. Such sensor-rich environments should be able to offer distributed and dynamic access...

  • InfoExpress expands wireless safeguards. Garcia, Andrew // eWeek;9/6/2004, Vol. 21 Issue 36, p50 

    The article presents information about 3.0 version of CyberGatekeeper LAN (CGLAN), an excellent network access control technology to wireless networks. Starting at $9,995, CGLAN 3.0 includes the 1U CyberGatekeeper Server hardware appliance, the Policy Manager software component and a license for...

  • PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED WIRELESS SENSOR NETWORKS. Sikandar, Ajay; Kumar, Sushil // International Journal of Computer Networks & Communications;Sep2014, Vol. 6 Issue 5, p99 

    Medium Access control (MAC) is one of the fundamental problems in wireless sensor networks. The performance of wireless sensor network depends on it. The main objective of a medium access control method is to provide high throughput, minimize the delay, and conservers the energy consumption by...

  • The New Frontier. Nambiar, Ranjit // Voice & Data;May2013, Vol. 20 Issue 5, p33 

    The article focuses on the new access control capabilities and the benefits of near field communication (NFC)-enabled smartphones. Among the fundamental requirements of mobile access control are the NFC-enabled handsets, an ecosystem of devices, and digital keys management. It is also noted that...

  • A Novel Technique to Protect Wireless Network against accidental Association. Reddy, Geetha Manchi; Chakravarthula, Keerthi Priya Nallan; Kantu, Abhilash Reddy; Manjunath, G. // International Journal of Computer Applications;Apr2012, Vol. 44, p22 

    With increasing numbers of corporate and organizations deploying wireless network and allowing the company personnel to access the internet or the wired backbone through wireless access points are increasingly getting exposed to hacking attacks. Due to easy hacking tools and less concerns about...

  • The need for device-based security is higher than ever. Gallant, Robert // Portable Design;Jan2005, Vol. 11 Issue 1, p24 

    The article reports that as organizations become more reliant on wireless technologies--and individuals suffer the painful consequences of identity theft and other cyber crimes--the need for device-based security is obvious. Enterprises have their own needs, for instance, to securely extend the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics