Confidentiality, Privacy, Integrity, Spoofing, Signal intercept, Key management and distribution, control of fraudulent usage of networks. Security of ad-hoc networks, wireless sensor networks, and cellular networks.