logo

International Conference on Electrical

Analyzing methods used in previous research for ALPR implementation and proposing suggestions for future research.

6 Pages4856 Words16 Views
   

Added on  2022-08-26

International Conference on Electrical

Analyzing methods used in previous research for ALPR implementation and proposing suggestions for future research.

   Added on 2022-08-26

ShareRelated Documents
RESEARCH PAPER 1
Abstract- Wireless networks are capable to provide
effective communication services to the companies by
which the data transmission can be performed easily. The
major difference among wired and wireless net is that
wireless network does not need connecting cables where
data communication can be done through wireless
channels and routers. Security is a serious problem linked
with wireless networks due to which companies and
government associations can hurt from the data break and
cyber-security attacks. This paper focuses on security
issues linked with wireless networks and evaluate effective
mitigation techniques for protecting data from criminals.
The conducted literature helped to obtain appropriate data
and facts about wireless networks and their security
attacks. Numerous research techniques are used including
qualitative design, inductive approach, philosophy,
secondary data collecting method, and content analysis. It
is found that DoS and ransomware are major attacks that
can be managed using firewalls and encryption techniques.
The future research will describe effective techniques to
manage such issues.
Keywords: wireless networks, cyber-crimes, security
attacks, firewall, and encryption
I. Introduction
Wireless network refers to the computer network
which is used in the communication systems for
performing data transmission over internet servers.
The utilization of wireless networks allows
communities to evade the expensive procedure of
adding cables into buildings and help to implement
data communication in a reliable way. The main part
of a wireless net is that it does not need connecting
cables due to which operators can segment data from
any location through wireless communication
systems. Security is the biggest issue linked with the
wireless networks as it contains communication
channels and wireless systems that are easily hacked
by the attackers [1]. In this modern era, many
communities use wireless networks to obtain real-
time data and addressing community gaps but also
suffer from data breach and security threats. The
presence of unauthorized access in the systems can
produce barriers for wireless networks and help
criminals to perform cyber-crimes effectively. The
significance of the research is to obtain security
threats linked to the wireless networks and suggest
effective countermeasures for addressing cyber-
crimes against wireless networks.
A. Research aim and objectives
To examine security threats and issues
linked with the wireless networks
There are numerous research objectives which are
highlighted below:
To understand the concept of wireless
networks
To review security concerns associated with
the wireless networks
To conduct a systematic literature review for
evaluating risk factors that leading security
issues in wireless networks
To describe effective mitigation techniques
against cyber-security attacks occurred in
wireless networks
B. Research questions
There are the following research questions that will
be addressed in this research:
What is the concept behind the wireless
network?
What are the security issues and attacks
associated with wireless networks?
How the security of wireless networks can
be enhanced?
II. Background of research
Wireless networks are capable to provide reliable and
effective services to the communities by which data
can be transmitted from one source to another in less
time. It is found that wireless networks have the
potential to reduce communication barriers and helps
to enhance business performance by providing real-
time information to business communities [2].
Security is an essential section of any organization
where wireless networks are less reliable for handling
privacy concerns due to which the level of cyber-
attack is growing quickly. The utilization of wireless
networks produces security risks in the companies
that negatively impact on the business performance
and sensitive data [15]. This paper will help to
evaluate and describe the security attacks and issues
that occurred in the wireless networks and
recommend the effective mitigation techniques by
which the level of security can be enhanced in the
wireless networks. A literature search will be added
for highlighting the viewpoints of other participants
in the case of wireless network security and review
Security Issues in Wireless Networks
International Conference on Electrical_1
RESEARCH PAPER 2
the findings of recent papers. It is significant to
determine risk factors leading security issues in
wireless networks as they help criminals to perform
cyber-security attacks and obtain personal
information of the users. This research will examine
risk factors and address security problems associated
with wireless networks.
III. Problem statement
The uses of wireless networks are growing quickly
and it is significant for the communities to
comprehend security dangers related to the wireless
systems. The previous studies examined security
threats related to wireless networks but did not
provide effective countermeasures [3]. There is no
specific study that highlights risk factors leading
cyber-crimes in wireless networks and mitigation
techniques. This paper will address the problem of
security in the case of wireless networks and
implement effective mitigation techniques that can
help to protect data from hackers and enhance the
level of security while accessing wireless networks.
IV. Literature review
It is determined that wireless network is a major
theme for the investigation and in recent years,
numerous papers were issued that highlighted
security problems associated with the wireless
networks. This chapter will review the findings of
previous articles and examine the research gaps that
occurred in the recent investigations. Moreover,
security threats and attacks linked with the wireless
networks will be evaluated and arguments will be
supported with effective evidence.
Zhao, et al., (2016) reported that wireless networks
are capable to provide reliable services by which
long-distance communication can be performed in an
appropriate manner [1]. The major part of a wireless
system is that it does not include connecting wired by
which the users can perform data transmission easily.
However, wireless networks include internet and
communication servers where the criminals can
transfer traffic signals and lead cyber-crimes easily. It
is determined that more than 67% of the companies
were faced with security threats and malware attacks
in the last four years due to the utilization of wireless
networks in the businesses.
So, security data is a major problem faced by
organizations and government authorities and it is
significant to examine the risk factors. Kumar, Jain,
and Barwal, (2014) supported this argument and
highlighted that most of the criminals include
malicious codes and malware software for producing
fraud and traffic signals which are capable to reduce
confidentiality of data and help to gather all reliable
information of the users [2]. From recent literature, it
is determined that lack of awareness about security
threats is a major factor that produces security risks
in the wireless networks and many consumers include
third party routers and hubs which are implemented
by the hackers for obtaining login credentials of the
computing devices [16].
Khan, Pathan, and Alrajeh, (2016) found that
network security issues in the wireless
communication systems fall into three sections
including availability, integrity, and confidentiality
[3]. Wireless networks are not capable to manage
malware signals and traffic signals due to which
users can reduce the availability of communication
channels that negatively impact on the performance
of communication systems. It is found that the
presence of unauthorized networks and malicious
codes in the communication systems impact on the
confidentiality and integrity of data and hackers are
capable to break security systems and gather personal
information.
Pietro, et al., (2014) provided their opinions and
reported that major three risk factors that leading
security issues in wireless networks such as lack of
awareness, presence of unauthorized signals and
misconfiguration of wireless networks in the
workplace [4]. Due to lack of awareness and
experience in cyber-crimes produce barriers for the
communities and employees access unauthorized
websites and signal that reduce the privacy of
computing networks and lead cyber-crimes. From the
recent survey, it is found that more than 56% of the
companies agreed that the presence of unauthorized
activities in the computing devices and wireless
networks is a leading factor due to which hackers can
obtain login credentials and collect all sensitive data
including address, profile names, financial
documents, and credit or debit card details.
On the opposite side, the misconfiguration of
networks also impacts on the security where
criminals can easily produce malware activities and
break the security of routers linked to the wireless
networks [17]. Therefore, it is highlighted that while
utilizing wireless networks, business communities
and government associations should focus on these
factors and try to aware of employees by providing
training or educational programs.
Djenouri, Khelladi, and Badache, (2020) highlighted
that one appropriate technique which is mainly
International Conference on Electrical_2
RESEARCH PAPER 3
adopted by hackers for targeting wireless networks is
to develop a rogue access point in the range of
current wireless networks [5]. The key concept
behind this security threat is to 'fool' several
computing devices linked to the wireless networks
into connecting to this admission opinion over the
genuine admission facts. For implementing rouge
access in wireless networks, hackers need physical
accessibility of routers and hubs that can be done by
transferring traffic or malware signals. Therefore, it is
determined that wireless networks should be secured
and protected from the rogue access point.
According to Mokhtar, and Azab, (2015), DoS refers
to the denial of service attack which is another
leading cyber-attack in the wireless network that
helps hackers to obtain sensitive information of users
and companies [6]. It is reported that DoS is the
simplest wireless network threat that has the potential
to provide accessibility and confidentiality of user’s
computing devices without taking their permission.
From recent investigation, it is inspected that DoS
attack needs limited admission to wireless facilities.
This can be performed in wireless networks by only
referring traffic signals at a precise target like
wireless server or communication channels [18]. It is
true that traffic signals are capable to reduce the
security of wireless networks due to which many
hackers produce larger traffics through malicious
codes and perform DoS related attacks in the wireless
networks.
Liu, Chen, and Wang, (2016) stated that transferring
traffic is not the only method to obtain accessibility
in the computing networks; for wireless systems, it
can be very easier because the transmitted
information can be inhibited using various kinds of
communication techniques [7]. When a wireless
network uses the 2.4 GHz band, intrusion may be
produced by somewhat due to which the hackers can
obtain the transmitted information and produce data
breach concerns.
It is highlighted that malware attack like ransomware
is a serious issue occurred in the wireless networks
where the hackers obtain personal information from
the communication systems and demand money from
the users or companies that can produce financial
issues and ethical concerns in the businesses.
Therefore, it is significant to emphasis safety while
using wireless systems and avoids unauthorized
activities from the communication systems. Man in
the middle is another bout that happens in the
wireless networks that have the capability to exploits
the IP addressed of the computing devices and help
criminals to perform hacking and data breach
activities.
Tomić and McCann, (2017) supported this argument
and highlighted that MITM attack allows criminals to
obtain login credentials of the wireless systems
utilized by the communities due to which the
personal data can be exploited easily [8]. The
presence of malware or malicious codes in the
wireless networks leads to privacy issues that
assistance the offenders to do cyber-attacks by
transferring larger spams and fraud signals to the
servers. From a recent study, it is determined that
various types of safety attacks occur in the wireless
networks including malware, spyware, phishing,
DDoS and many more. All these attacks are based on
the botnet and malicious programs where the
criminals transfer unwanted signals to the main
servers and users access such data into the
communication systems that negatively influence the
security of wireless networks [19].
In the last two years, 34% of the companies
worldwide were suffered from the cyber-security
attacks where the criminals affected wireless
networks and implemented data breach activities for
gathering personal information. Gandotra, Jha, and
Jain, (2017) suggested that the utilization of firewall
tools can help the communities to improve the safety
of the wireless network that has the capability to
detect fraud and malware signals transmitted by the
hackers and enhance confidentiality and integrity of
data easily [9]. Most of the communities use firewall-
based routers for implementing wireless networks
that help to manage unauthorized access and enhance
the security of communication systems. Moreover,
companies should provide training to the workers as
the lack of awareness produce problems for securing
data by which the employees can handle unwanted
signals and effectively perform data communication
activities in the workplace.
Mukherjee, et al., (2014) reported that less effective
passwords applied to the communication networks
can be detected by the hackers using botnet processes
due to which the companies are not capable to secure
wireless networks [10]. In this modern era, the usage
of wireless communication systems is leading
quickly and many users provide simple passwords to
the computing devices and communication systems
that can be hacked easily. So, it is suggested that
consumers should include strong and complex
passwords and adopt biometric systems by which the
level of privacy can be enhanced in the wireless
networks. The previous studies provided brief
information about security attacks that produced
International Conference on Electrical_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology Networking 2022
|6
|1887
|13

Leading Communication Technology
|5
|2088
|16

Assignment on Securing Enterprise Infrastructure
|6
|1354
|16

Wireless Network Security and Preventive Techniques
|13
|2943
|220

Cyber-securityattacks in Wireless Networks Research Paper 2022
|14
|3318
|20

Crypto Currency and Cyber-Crime: Types of Malware, Mitigation Tools and Processes
|14
|919
|105