StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Balance between wireless security and performance - Thesis Proposal Example

Cite this document
Summary
This wide array of uses includes communication, mobile commerce as well as business transactions. Although they have been accepted as convenient, the wireless…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Balance between wireless security and performance
Read Text Preview

Extract of sample "Balance between wireless security and performance"

0 PROPOSED TOPIC. The proposed topic for the research is “Improving the wireless network: achieving a balance between security and performance.”2.0 INTRODUCTION Of late, the use of wireless devices for various uses ranging from private to commercial has risen to great extents. This wide array of uses includes communication, mobile commerce as well as business transactions. Although they have been accepted as convenient, the wireless systems have been under scrutiny about their level of security.

The wireless security systems have been scrutinized as being restricted in terms of performance. Studies have indicated that eavesdropping is quite easier in the wireless security than in the Local Area Network. This is because; in the Local area Network, a person has to have physical connection in that particular network (Berbecaru 20). 3.0 BACKGROUND OF STUDY This physical connection is easily detected and can be traced to the eavesdropper. This as a result has made the wireless security be under scrutiny since it fails to offer the appropriate security.

The security risks that accompany the wireless environment are quite exposing. The amount of security that should be incorporated in the system normally depends on the size and the nature of information being handled by the organization as well as on the devices being used (Dawoud 56). The first and foremost way is to maintain a full understanding of that particular networks topology. This understanding is important as it creates an improvement to the system design whenever the need arise. These improvements are important in optimization of the performance of that system.

This is important especially where there is periodic assessment of the security controls and their performance (Hirani 39).This research shall seek to come up with a way of securing the wireless network and enhance the security levels to satisfaction. The research shall propose devices that shall also aid the mobility for the wireless devices. 4.0 LITERATURE REVIEW Many scholars have come up with writings assessing the performance of wireless devices. They have come up with ways of maintaining the wireless networks as well as how to create the same.

Maintaining a secure network should be a continuous activity that keeps going on. It should be assessed regularly in terms of performance and if there is need to upgrade or improve the technology that is being used (William 78). Keeping inventories of the equipments that are used in that wireless network is also a good way of ensuring performance. In addition, having back up for the transactions and the communications is also important to secure the system (Erica et al. 44). There should be a wide usage of inherent security features.

An example of these features includes encryption methods that make it difficult for parties not intended to understand the process (Kerry 11). Features such as authentication can also be employed to fortify the security system. Firewalls and the other protecting means should not be left out. Another means is controlling the mobility of the wireless devices (Ghassan 34). Controlling here does not mean restriction but rather monitoring the mobility of the wireless gadget. Wireless devices are constantly in motion from one station to another.

They are prone to misplacement and getting lost. Physical monitoring and tracking is important to offer further protection to the wireless networks. It is quite obvious that physical controls that protect the stationery devices are much more efficient than the mobile ones (Joseph 16).4.0 PROBLEM STATEMENT Wireless security is not as secure as the LAN network. This is because unlike LAN, wireless security does not require any physical connection. This makes it possible for a neighbour with the same default setting be able to connect to your network and malicious or accidentally use your bandwidth.

Some might go as far as changing or reconfiguring your router to your oblivion (Almuhaideb 67). This is quite a risky for firms and organizations that are dealing with very sensitive information. Therefore there is a great need for seeking ways to enhance the performance of wireless devices.5.0 RESEARCH OBJECTIVE The proposed research shall seek to achieve the following objectives:a) The researcher shall also review the ways in which the wireless network has shortfalls and is lacking. Top in the list here shall be how to improve the network and especially means of having efficient and private networks.b) Critically evaluating the performance of wireless devices against the stationery devices.

From the evaluation the researcher shall try to find ways to harmonize the disparity.c) The research shall also seek to identify the pitfalls that exist in the current structure of the wireless networks. After identifying these, the researcher shall seek to propose ways of securing the wireless networks.d) Seek to find ways of securing wireless networks and improving the whole wireless structure in general.6.0 RESEARCH METHODOLOGY The researcher shall use different forms of methodologies. A summary of the methodology that the researcher shall employ is as follows:The researcher shall carry out experiments on the performance of the wireless devices.

The researcher shall also review and reports and statistical data that seek to analyze the performance of wireless devices.The researcher shall also try to engage the information technology experts in interviews on the ways of improving the security of wireless devices.7.0 LIMITATIONS The intended study shall be limited a few factors which are beyond the researchers control. In terms of security the researcher shall be limited in determining the privacy of the network. It is not easy to know whether a person is using your network.

The wireless connections lack physical connecting devices that can be traced to the person who has entered your network.A signal fluctuation is another challenge posing against this research. Since this research shall depend on the transmission of signals. This can be affected by physical barriers such as walls. This can have an impact on the research finds and the researcher shall have to move from one place to another or acquire strong transmission devices.Another limitation shall be brought about by the ever changing nature of information technology.

The information technology keeps on changing and new devices are being invented at a very fast pace. This shall offer the researcher a challenge as over and over again she shall be required to understand such changes that are taking place and affecting the IT sector. 8.0 CONCLUSIONThis research is mainly seeking to assess the ways of enhancing the level of performance of the wireless network. The research shall seek to evaluate the improvements of how to improve the wireless network. Works citedAlmuhaideb, A.

; Alhabeeb, M.; Le, P.D; Srinivasan, B., "Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance,” 24th IEEE International Conference on Advanced Information Networking and Applications, pp.1047-1053, 20-23 April 2010.Berbecaru, D., "On Measuring SSL-based Secure Data Transfer with Handheld Devices," 2nd International Symposium on Wireless Communication Systems, 2005, pp.409-413, 7-7 Sept. 2005.Beyond Fixed Key Size. Classifications towards a Balance between Security and Performance. 2008. Web.

29 December 2011 http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5474826 Dawoud D.S., Alexis B, P.Dawoud “A Study of the Energy Consumption of Security Encryption Policies in Wireless Devices.” Submitted to SATNAC008Erica, Simcoe, Hirsh Goldberg, and Mehmet Ucal. An Examination of Security Algorithm Flaws in Wireless Networks. The Institute for Systems Research, A. James Clerk Scholl of Engineering, 2004Ghassan, Kbar, Wathiq Mansoor. Testing the Performance of Wireless Lan. Asia-pacific Conference on Communications, Perth, Western Australia, October 2005.

Harold, Lars McCarter. Analyzing Wireless LAN Security Overhead. M.Sc thesis in Electrical Engineering. Virginia Polytechnic Institute and State University. Falls Church, Virginia, April 2006.Joseph Kabara, Prashant Krishnamurthy and David Tipper. Information Assurance in Wireless networks. University of Pittsburgh, Fourth Information Survivability Workshop, 2001Kerry, McKat. Trade-offs Between Energy and Security in Wireless Networks. M.Sc Thesis in Computer Science at Worcester Polytechnic Institute, April 2005Sohail, Hirani.

Energy Consumption of Encryption Schemes in Wireless Devices. M.Sc Thesis in Telecommunications, University of Pittsburg, School of Information Science, Department of Information Science and Telecommunications, 2003WLANS. Wireless Dream, Security Nightmare, Dermot McGrath, Broadband Wireless. Business Magazine, Vol. 3, No. 8, January/February 2003Wireless LANs: Global Market Demand and Opportunity Assessment. InfoTech, PBI Media, Jan 2002William, Stallings. Cryptography and Network Security. Prentice Hall Publication, 1999. Print

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Balance between wireless security and performance Thesis Proposal”, n.d.)
Balance between wireless security and performance Thesis Proposal. Retrieved from https://studentshare.org/information-technology/1587156-balance-between-wireless-security-and-performance
(Balance Between Wireless Security and Performance Thesis Proposal)
Balance Between Wireless Security and Performance Thesis Proposal. https://studentshare.org/information-technology/1587156-balance-between-wireless-security-and-performance.
“Balance Between Wireless Security and Performance Thesis Proposal”, n.d. https://studentshare.org/information-technology/1587156-balance-between-wireless-security-and-performance.
  • Cited: 0 times

CHECK THESE SAMPLES OF Balance between wireless security and performance

Information Systems: What We Do With It

The major advantages of WPAN are listed below Facilitates usage of combination of an automation protocol, COTS wireless technology and unmodified Ethernet leading cost effective solutions ,flexibility in low power design and application of innovative technology enhancing the performance of overall WPAN It is important to understand the appropriate and correct usage of wireless technology and the primary focus will be on the safety and control oriented use in order to create a balance between power availability and power consumption....
3 Pages (750 words) Research Paper

Organizational Behavior Analysis of Verizon Wireless

is one of the well known companies in wireless communication sector that offers services to mass market, government, business and wholesales customers.... Later on, in January 09, 2009 Alltel wireless acquired Verizon wireless in a deal of $28.... Verizon was the first company to introduce wide area wireless broadband network in US and also offered the first wireless 3G multimedia services to its customers.... Cellular, AT & T, Leap wireless are few of the companies that pose as major competitors of Verizon....
8 Pages (2000 words) Essay

How Wireless Internet Has Changed the Way We Do Business

The increase of competition worldwide has led firm to continuously update their technology in order to improve their position towards their rivals; the technology used in the context of modern organizations can have many different forms involving in all aspects of these firms'… Since the introduction of Internet the perceptions of organizational leaders on the value of technology have changed; Internet offered to organizations of all sizes the advantage of reaching their customers worldwide without being – physically – established In this way, Internet promoted a balance regarding the potentials of firms to operate in the international market; the limitation of operational costs – which followed – helped enterprises to survive even during severe market turbulences; however, through the years, another issue appeared; technology was continuously developed, new systems were established and the forms of Internet connectivity changed; wireless Internet solutions made available to businesses and individuals in all countries worldwide....
7 Pages (1750 words) Research Paper

Global Finance Inc Network Management

s previous network architecture had many flaws in it that were affecting the company's performance.... There were many cyber-attacks that disturbed the operation of the company's servers in addition to the reduced balance of network traffic that caused the slow performance of the entire system.... Slow performance and latency issues were a problem as well.... Such technology can help alleviate the traffic issues that the network was having and help in speeding up the performance of the network system as well....
8 Pages (2000 words) Case Study

Introduction to WiMAX Technology

hellip; WiMAX is a wireless transmission technology that can be used to two wireless network categories; that is the wide area network, abbreviated as (WAN) and a Metropolitan Area Network abbreviated as (MAN).... A network may be created that uses cables (fixed connection) or that use radio waves (wireless network).... While fixed Internet networks continue to form the backbone of the communication system, wireless data transmission has become more favored for various reasons....
13 Pages (3250 words) Research Paper

Investment Analysis Report on Cable & Wireless Group

This paper contains a critical assessment of the performance of Cable & Wireless company on its profitability, liquidity, solvency status, as well as on the market and other forces including an analysis of risk factors affecting the investment in stocks of the company.... The Cable and wireless were placed in the latter category till 2009....
12 Pages (3000 words) Research Paper

Local Area Networking Technologies

he LAN Network required for the stadium should be highly secured by keeping the stadium's own data and the guest's data separate as well as offering secure wireless connections to the event organizers in the stadium.... This assignment "Local Area Networking Technologies" focuses on a modern stadium sports stadium in the city of Colorado....
12 Pages (3000 words) Assignment

Securities and Exchange Commission and Community Reinvestment Act

These include performance logs and network security (Institute, 2012). Training of steps in this field would then enable justified users such as permitted staff to understand encryptions and authentication of wireless mechanisms that are in use.... Application of the above systems would then go ahead in selective selections of authentic databases, passwords, and user identities as far as the internet security is concerned.... In order to tackle various threats and risks, sections of clinical systems have adopted wireless networks, which they use to present and obtain information at the point of care....
6 Pages (1500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us