StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security in Wireless Network - Literature review Example

Cite this document
Summary
This literature review "Security in Wireless Network" presents data security as an ultimate perilous issue in ensuring safe information transmission via the internet. Issues of network security are currently becoming essential as society is in the movement towards the age of digital information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful

Extract of sample "Security in Wireless Network"

Security in Wireless Network Name: Institution: Course: Instructor: Date of submission: Introduction With the initiation of the global web as well as the emergency of the social network and e-commerce application, many firms across the globe generate numerous data on a daily basis. The emergence of the security protocol as well as IT Governance has placed a great role in ensuring the network security (Xiao, Shen, X, & Du, 2011). However, the present protocol have not yet completely being safeguarded against the radio wave’s location boundary whose flow is beyond the organization’s physical boundary and at the same time ensures the interception of data by unauthorized individual (Kent, Dicoi, & National Institute of Standards and Technology (U.S., 2007). Overview of Wireless Security Going wireless mainly involve ensuring the connection of he “access point” of the internet such as DSL modem and cable to a wireless router that has the capacity to send the signal via the air . The system of network security relies on the protection layers and comprises of numerous constituents including security software and networking besides appliances and hardware. All these constituents have a close working relationship to ensure an increase in the overall computer network’s security (Koutroubinas, 2014). Network security comprises of policies and provisions adopted by the administrators of network to ensure the prevention as well as monitoring unauthorized access modification, misuse, denial of network-accessible resources, and computer network. Network security shields various computer networks in both the private and public domain that are utilized in the day to day jobs for carrying out transactions as well as ensure communications among government agencies, businesses, as well as individuals (Kent, Dicoi, & National Institute of Standards and Technology (U.S., 2007). Network security is also involved in the enterprises, organizations, as well as other institutions, playing a role of securing the network, and overseeing and protecting the resource of network by giving it unique name as well as corresponding password. Cloud and key management Encryption offers the protection of data while key management ensures that the protected data can be accessed. The encryption of data over network should be in transit. Both key management as well as encryption is essential in assisting secured the stored data as well as the applications in the cloud. Among the effective key management’s requirement include the following: Secure key stones: it is important to ensure the protection of these key from mischievous users. In case these malicious users access these key stones, it is likely that they would have an access to the encrypted data, and therefore, it is important to ensure the protection of the key stones in storage, transit, as well as on backup media (Xiao, Shen, X, & Du, 2011). Key stone access: it is important to ensure that only the authorized users are accessing the data. The best way to ensure that access is being controlled is by ensuring role separation. Recoverability and key backup: It is important to ensure that secure backup as well as recovery solutions are availed to the key. The recovery mechanism as well as backup is essential in preventing the loss of key. Cryptography Cryptography is a technique utilized in ensuring the data security, thus it is an essential emerging technology. The present day cryptography occurs in various fields including computer science, electrical engineering, and mathematics. Among the applicants of cryptography include computer passwords, electronic commerce, and ATM cards. The global web development increased the utilization of cryptography for business and commerce application. It is clear that cryptography, as an emerging technology is essential for network security. When Neutral Network is utilized for Cryptography Model, high security is likely to be supported. Cryptography and neutral network can greatly contribute towards the networks security field. The brought about by neutral security appears in the form of neuronal functions and weight, shielding it against breaking. In this case, content data acts as cryptography’s input data, ensuring that the attackers are not reading the data and thus making the data to be secure. The neural networks’ as well as similar algorithms’’ self-learning, mutual learning, as well as stochastic behavior ideas can be utilized for the various cryptography aspects such as solving the problem of the key distribution by the use of ‘neural network mutual synchronization, public-key cryptography, pseudo-random number generation, or hashing. Another idea entails the capacity of the neural network to use “bias” to ensure the separation of space in non-linear pieces (Xiao, Shen, X, & Du, 2011). Secret key Cryptography Cryptography is mainly concerned with secret code writing as well as constructing and examining protocols that ensure the blocking of adversaries. The secret key encryption ensures the utilization of one key for both decryption and encryption. Both the receiver as well as the sender must be aware of the key. The approach’s main challenge is mainly the key distribution. There exist two categories of the secret key cryptography namely the block ciphers or the stream ciphers. Wireless Network Applications Most present wireless networks are employed in personal communication context where human beings are the end users (Perez, 2014). Recent technological advances have motivated new domains of application for wireless networks for instance, the utilization of the WSNs (wireless sensor networks) for the monitoring of the environment in both military and civilian settings (Moorsel, Ruck-Keene, 2015). VAHETs (vehicle ad hoc networks) have played a great role in ensuring safer roads as well as improving the experience of driving. At the same time, DTNs (disruption-tolerant networks) is essential in ensuring connectivity of low cost to environments experiencing challenges (Velayutham, Siva, & Manimegalai, 2015). Similarly, interest in BANs (body-area networks) has been on rise with envisioned applications in law enforcement, medical, sports, as well as military domains. These evolving wireless networks ensure an extension of network function, ensuring the presence of ubiquitous computing (Xiao, Shen, X, & Du, 2011). General Issues of Security It is clear that wireless network have a high vulnerability compared to the wired network. In addition, complications are likely to occur when the dynamic network topography and node mobility is present. Various factors contribute to the security problems and they include the following. Channels: wireless usually encompasses broadcast communication and this makes jamming and eavesdropping (Perez, 2014). Mobility: by its nature, wirelessness enables mobility and the communication using wireless gadgets ensures the replacement of physical connection by logical association. Ensuring the establishment of secure association when the mobility is present is challenging, especially in the case of mobility setting, for instance VANETs. Similarly, in case of the affiliation of the wireless device with human user, device tracking gives the revelations of the mobility patterns and the user location (Vaseashta, Susmann, Braman, & IOS Press, 2014). Security and Mobility Since both the users as well as the data that they usually carry is currently computing’s mobile component, there has been the occurrence of security problems that differ from those present in traditional computing (Huang, MacCallum, & Du, 2010). The traditional computing physical protection have a high chance of being afforded by ensuring the physical isolation of the computer as well as data system from other environmental components. Such a configuration can help in ensuring self-sufficiency of the system without necessarily communicating with the outside world. In mobile computing, it is not easy to attain the self-sufficiency as well as the isolation because of the scarcity of the resources, and this makes it necessary to ensure the communication with the mobile system of support (Stallings, 2014). . The user’s mobility as well as the data carried by these users introduces the problem of the security system from the user’s location and existence point of view as well as from the authenticity’s and privacy’s point of the exchanged data between the users as well as the fixed host. That means that the user may remain anonymous to the most of the network users except a select number that interacts with the users (Cardwell, 2013). The user anonymity problem in mobile computing is linked to a trust problem afforded by each wireless’s wireless network node as well as the security problem of the data location regarding a user in case the location data is transferred or stored between nodes since the users may be moving in a fashion of nomadism. These nodes should ensure that the users have some assurance about their anonymity, separate from the various trust levels existing in every node (Mohammed & Roberts, Jason, 2015). This is essential when it comes to a user who crossing between two different zones under two separate nodes, each with a different level of trusts (Vacca, 2014). Another important aspect is the secure data transfer between the node’s databases which ensure that the location data is held as well as other parameters or information in the profile of the user. Another likely problem in the wireless security is the likelihood of the information leakage via the inference brought about by the attacker impersonating as a support system of the mobile with or without receiving support from the sabotaged mobile support station (Huang, MacCallum, & Du, 2010). Security in Disconnect Security in disconnect is a major problem that results from the power (battery) and the restrictions. The mobile unit disconnection from a support system of a mobile is essential for the conservation of power. A mobile unit has the capacity of running on a temporary power supply form while in the process of recovering its main power source. The mobile computing birth is an indication of computing and information system’s new era (Doavi, & Hossein Parvan, 2015). The mobile computing concept results from the comprehension that a decrease in the size of the computing machinery as well as an upsurge in the computing power will mean that the demand of the same by the end users will be high because they will help them in their day to day life, assisting them in carrying out the daily tasks (McGough, 2015). Protecting the Wireless Transmission Confidentiality There exist two measures that can ensure a reduction in eavesdropping risk on wireless transmission (Chaki & Chaki, 2014). The first method involves the utilization of a method that would ensure that the wireless signals will not be easily located as well as intercepted. The number two method involves the utilization of encryption to ensure the preservation of confidentiality even with the interception of the network security (Nisbet & Woodward, 2016). Techniques of signal hiding: as a way of ensuring the wireless transmissions’ interception, it is important for the attacker to carry out identification as well as the location of the wireless networks. However, there exist numerous steps that would ensure that it become more difficult to locate the access points of the organizations’ wireless system (University of Chester et al. 2015). Among the strategies to be used include turning off the SSID (service set identifier), ensuring that the strength of the signal is at it least possible level that would ensure the provision of locating wireless access point or requisite coverage in the building’s interior, away from the exterior walls and the windows (Nirmal, Ahirwar & Deen, 2016). Other effective costly methods include the utilization of the signal emanations in the desired coverage areas or the use of the TEMPEST (techniques of signal emanating shields). Encryption: ensuring the encryption of all the wireless traffic is among the best methods for ensuring the protection of the information confidentiality and this is especially essential for firms that are highly regulated (Diaz & Sanchez, 2016). Preventing intercepted communications’ alteration: wireless interception as well as alteration can be prevented through the use of a strong encryption as well as a strong authentication of the users as well as the devices (Cardwell, 2013). Conclusion Data security is an ultimate perilous issue in ensuring safe information transmission via the internet. Apart from that, issues of network security are currently becoming essential as the society is in the movement towards the age of digital information. With an upsurge in the number of people using the internet, cyber-crime is on rise, and this calls for an increase in the cyber-security systems. The technology of wireless network is the most utilized network technology. The various issues that occur in wireless communication have a direct association with the security as well as privacy of the confidential data. This results from the transmission of wireless networks data between devices via the air as well as radio waves, making it susceptible to individuals who are not authorized. References Abdollah Doavi,, & Hossein Parvan. (January 01, 2015). Security in Wireless Sensor Networks. International Journal of Computer Science and Network Solutions, 3, 1.) Cardwell, K. (2013). BackTrack: Testing Wireless Network Security. Birmingham: Packt Publishing. Chaki, N., & Chaki, R. (2014). Intrusion detection in wireless ad-hoc networks. Boca Raton, FL: CRC Press. Diaz, A., & Sanchez, P. (2016). Simulation of Attacks for Security in Wireless Sensor Network. Sensors (basel, Switzerland), 16, 11.) Huang, S. C.-H., MacCallum, D., & Du, D. (2010). Network security. New York: Springer. Kent, K., Dicoi, D., & National Institute of Standards and Technology (U.S.). (2007). Wireless network security for IEEE 802.11a/b/g and Bluetooth: Recommendation of the National Institute of Standards and Technology. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology. Koutroubinas, S., Karoubalis, T., Rozos, P., Nastou, P., & IEEE International Symposium on Consumer Electronics, 2004. (January 01, 2014). Enhancing security in wireless networks. 214-218. McGough, Andrew Stephen, Arief, Budi, Gamble, Carl, Wall, David, Brennan, John, Fitzgerald, John, van Moorsel, Aad, ... Ruck-Keene, Ed. (2015). Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour. (Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour.) Innovative Information Nirmal, N., Ahirwar, M. K., & Deen, A. (January 01, 2016). Efficient key management for security in wireless sensor network: A survey. International Journal of Control Theory and Applications, 9, 34, 361-366. Nisbet, A., & Woodward, A. (January 01, 2016). A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs. Perez, A. (2014). Network Security. London: ISTE. Stallings, W. (2014). Network security essentials. Pearson. Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: Principles and practice. Harlow, England: Pearson. University of Chester ; Al Khawarizmi University College ; University of Chester, Qayyum, Bushra, Saeed, Mohammed, & Roberts, Jason A. (2015). Data aggregation in wireless sensor networks with minimum delay and minimum use of energy: A comparative study. (Article.) British Computer Society. Vacca, J. R. (2014). Network and system security. Amsterdam: Syngress. Vaseashta, A., Susmann, P., Braman, E., & IOS Press. (2014). Cyber security and resiliency policy framework. NATO Advanced Research Workshop on Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework. Velayutham, R., Siva, G. E., & Manimegalai, D. (January 01, 2015). Enhancing the security of AES algorithm in wireless network. 326. Xiao, Y., Shen, X., & Du, D. (2011). Wireless network security. New York: Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security in Wireless Network Report Example | Topics and Well Written Essays - 2000 words, n.d.)
Security in Wireless Network Report Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/technology/2068017-security-in-wireless-networks
(Security in Wireless Network Report Example | Topics and Well Written Essays - 2000 Words)
Security in Wireless Network Report Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/technology/2068017-security-in-wireless-networks.
“Security in Wireless Network Report Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/technology/2068017-security-in-wireless-networks.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security in Wireless Network

Critique on Wireless Hotspots: Petri Dishes Of Wireless Security by Bruce Potter

This lack of bidirectional authentication poses the very large and real risk of a hacker, acting friendly to gain access, can then use the wireless network to gain access to other clients accessing it.... This certificate level access is nearly impossible to use at a hotspot since the accessing client's would have to have the keying certificate in order to enter the wireless network.... But does that mean that there is little or no security in place?...
4 Pages (1000 words) Essay

The System Design and Implementation Process of the Network

A wireless access point is also installed in the departments which require a wireless network.... The paper "The System Design and Implementation Process of the network" looks into the user account management.... The network security officer should ensure that the user accounts.... The presence of nonfunctional user accounts makes the network system vulnerable to the attackers.... hellip; Research has shown that most organization's network security is compromised due to the failure to observe the security policy....
6 Pages (1500 words) Assignment

Security in Wireless LAN

Antenna takes directions from the wireless network interface card of the computer.... The laptop must be having a wireless network interface PCMCIA card for WLAN compatible.... wireless network interface cards work with a 48-bit MAC address associated with them.... MAC address filtering is used to limit the number of hardware components that can access the wireless network.... Before venturing onto the security aspect it will be worthwhile here to have a glimpse of setting up a reliable and efficient network....
12 Pages (3000 words) Essay

Network Security Architecture

1 specifies a group of technologies governing wireless Ethernet connectivity between client devices and wireless hubs connected to a physical network, (Conover et al.... 1 specifies a group of technologies governing Running head: Secure wireless LAN Architecture SECURE wireless LAN ARCHITECTURE According to Hermans (2005) there are two major methods for implementing WLAN networks today, both of which involve wireless 802.... This can be aided by establishing security policies and practices, separating internal networks logically, eliminating unnecessary protocols, protecting wireless devices, restricting AP connections, enabling VPN access only, among other measures....
1 Pages (250 words) Research Paper

Wireless hacking leads to corporation security breaching

The use of Wi-Fi hacking is more common since, it has become common for hackers to target wireless networks and gain information from a single source which in turn leads to the gain of information from other computers connected to the network.... Companies have warned against it and are trying to secure the network by educating the masses.... Firesheep is one such example of a software that helps protect the client information by checking what the other people on unsecured network are doing and then they can log onto the same sites as theirs....
2 Pages (500 words) Essay

BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK

Visual Information Processing in wireless Sensor Networks: Technology, Trends, and Applications.... Every border troop controls and BORDER SURVEILLANCE USING WIRELESS SENSOR network Introduction Border patrol systems have lately got interest to tackle the concerns regarding national security.... eployment methodologyIn applications of border patrol, the established supervising network ought to cover a considerably large monitoring region.... overage A network model denotes the region covered by a particular sensor at a particular location....
1 Pages (250 words) Research Paper

LAN Networks Issues

uestion FiveAccording to Kizza, the most appropriate computer network is Local Area network (LAN), with two types of connections- through coaxial cables and wirelessly.... A guide to computer network security.... However, the four mediums differ in a number of factors such as performance, bandwidth levels, security, management, noise susceptibility, cost… A good example of their diversity is the type of applications they apply (digital or analogue), where the twisted pair cable is used in analogue voice LAN Networks al Affiliation) Question One There are a variety of transmission media formats but the core types are fiber optics, twisted pair cable, wireless and coaxial cables....
2 Pages (500 words) Essay

Installation of Wireless Solution

By installing this wireless service, it will be convenient for the students; they will be able to access network resources from nearly all any convenient location within the campus.... The author of this paper "Installation of wireless Solution" discusses how information can be obtained from the internet through the wireless source on the example of The Association of American Medical Colleges, including the main benefits of wireless connection for the success of the campus....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us