Analyze the Research Paper: Wireless Network Security
VerifiedAdded on 2019/09/24
|12
|2622
|363
Report
AI Summary
The research paper discusses the importance of wireless network security in today's scenario. The researchers utilized primary methods such as surveys to collect information from target audiences and presented their findings using descriptive statements, tabular formats, etc. The paper highlights that artificial noise generation technique has great potential to offer wireless physical layer network security, making it a growing concern in today's world.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/4d6b166e-9957-4e79-9929-c5fec93d89a7-page-1.webp)
Running Head: Literature Review Analysis
Literature Review Analysis
Literature Review Analysis
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/68a88ab3-1079-4150-b956-47bafe7182da-page-2.webp)
Literature Review Analysis 2
Table of Contents
Introduction......................................................................................................................................2
Network Security Management in Wireless Networks through Zero Knowledge Proof................2
Research Problem........................................................................................................................2
Literature Review.........................................................................................................................3
Subjects........................................................................................................................................3
Instrumentation............................................................................................................................4
Data Collection, Presentation, and Analysis................................................................................4
Summary and Discussion.............................................................................................................4
Research Type..............................................................................................................................5
Overall Evaluation.......................................................................................................................5
A Survey on Wireless Security: Technical Challenges, Recent advances and future Trends.........6
Research Problem........................................................................................................................6
Literature Review.........................................................................................................................6
Subjects........................................................................................................................................7
Instrumentation............................................................................................................................7
Data Collection, Presentation, and Analysis................................................................................7
Summary and Discussion.............................................................................................................8
Research Type..............................................................................................................................8
Overall Evaluation.......................................................................................................................8
Conclusion.......................................................................................................................................8
References......................................................................................................................................10
Table of Contents
Introduction......................................................................................................................................2
Network Security Management in Wireless Networks through Zero Knowledge Proof................2
Research Problem........................................................................................................................2
Literature Review.........................................................................................................................3
Subjects........................................................................................................................................3
Instrumentation............................................................................................................................4
Data Collection, Presentation, and Analysis................................................................................4
Summary and Discussion.............................................................................................................4
Research Type..............................................................................................................................5
Overall Evaluation.......................................................................................................................5
A Survey on Wireless Security: Technical Challenges, Recent advances and future Trends.........6
Research Problem........................................................................................................................6
Literature Review.........................................................................................................................6
Subjects........................................................................................................................................7
Instrumentation............................................................................................................................7
Data Collection, Presentation, and Analysis................................................................................7
Summary and Discussion.............................................................................................................8
Research Type..............................................................................................................................8
Overall Evaluation.......................................................................................................................8
Conclusion.......................................................................................................................................8
References......................................................................................................................................10
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/ae47bdda-5533-4edd-9a5a-54b8fda34457-page-3.webp)
Literature Review Analysis 3
Introduction
In this paper, the literature review and findings of two different research articles on wireless
network security have been analyzed. This has been done with the sole motive of collecting the
viewpoint of both research scholars on the same topic. This will give us significant knowledge
about the different aspects of the wireless network security. The two research papers that has
been selected for this paper is "Network Security Management in Wireless Networks through
Zero Knowledge Proof" and "A Survey on Wireless Security: Technical Challenges, Recent
Advances and Future Trends" The first research paper has been written by the K. VamsiRam,
and I. Bala Venkateswarlu (Ram, 2012). On the other hand, the second paper has been written by
the Yulong Zou, Xiambin Wan, Lajos Hanzo, and Fellow (Zou, 2016). Both of the papers have
given in-depth knowledge about the selected topic of wireless network security. This has been
performed by using a large number of data collection tools and in-depth analysis. Therefore, it
can be said that the both papers come with a relevant outcome with significant benefits for target
audiences.
Network Security Management in Wireless Networks through Zero
Knowledge Proof
Research Problem
In this paper, the research problem is network security which is being focused by the writer
during this paper (Ram, 2012). It has been identified in the paper that security is one of the most
important problems in wireless sensor networks. Therefore, with the help of this paper, the writer
Introduction
In this paper, the literature review and findings of two different research articles on wireless
network security have been analyzed. This has been done with the sole motive of collecting the
viewpoint of both research scholars on the same topic. This will give us significant knowledge
about the different aspects of the wireless network security. The two research papers that has
been selected for this paper is "Network Security Management in Wireless Networks through
Zero Knowledge Proof" and "A Survey on Wireless Security: Technical Challenges, Recent
Advances and Future Trends" The first research paper has been written by the K. VamsiRam,
and I. Bala Venkateswarlu (Ram, 2012). On the other hand, the second paper has been written by
the Yulong Zou, Xiambin Wan, Lajos Hanzo, and Fellow (Zou, 2016). Both of the papers have
given in-depth knowledge about the selected topic of wireless network security. This has been
performed by using a large number of data collection tools and in-depth analysis. Therefore, it
can be said that the both papers come with a relevant outcome with significant benefits for target
audiences.
Network Security Management in Wireless Networks through Zero
Knowledge Proof
Research Problem
In this paper, the research problem is network security which is being focused by the writer
during this paper (Ram, 2012). It has been identified in the paper that security is one of the most
important problems in wireless sensor networks. Therefore, with the help of this paper, the writer
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/fbb2b1b9-4a16-4a64-9c61-1cdb5760cc31-page-4.webp)
Literature Review Analysis 4
wants to aware the public regarding the security threats, and attacks of WSN so that security can
manage accordingly. Therefore, in his paper, the writer gives a mean to resolve the problem of
security in information technology networks. This is known as the zero knowledge protocol. This
protocol is organized for the verification of sensor cloning attack which further secures the
network in an effective manner.
Literature Review
Diffie (2014) said that the secondary and primary are the important types of security goals that
can identify in the Wireless Sensor Network. The primary motives are known as the standard
security goals like authentication, confidentiality, and the integrity. On the other hand, the
secondary goals are time synchronization, secure localization, and the data freshness. Apart of
this, El-Hawary (2014) concludes that the base station, cluster head, and member nodes are three
important nodes that prove helpful in managing the network security. It is because the every
cluster node had information about the member nodes, and the base station manages the
topological information that further manages the network security in a significant manner.
Subjects
The belonging subject of the paper is information technology. It has been identified by
evaluating its topic and the work that has contained in the document. The main motive of the
paper is to implement a security model for wireless sensor networks and classify different attacks
of it. Therefore, it has been understood from this that the subject of the paper is information
technology. This is a quite popular subject of nowadays. It is because the technical advancements
and growth are growing nowadays (Pathan, 2016). Therefore, the growing growth of technical
advancements gives birth to technological subjects that further helpful in giving significant
knowledge about the information technology and its related measures.
wants to aware the public regarding the security threats, and attacks of WSN so that security can
manage accordingly. Therefore, in his paper, the writer gives a mean to resolve the problem of
security in information technology networks. This is known as the zero knowledge protocol. This
protocol is organized for the verification of sensor cloning attack which further secures the
network in an effective manner.
Literature Review
Diffie (2014) said that the secondary and primary are the important types of security goals that
can identify in the Wireless Sensor Network. The primary motives are known as the standard
security goals like authentication, confidentiality, and the integrity. On the other hand, the
secondary goals are time synchronization, secure localization, and the data freshness. Apart of
this, El-Hawary (2014) concludes that the base station, cluster head, and member nodes are three
important nodes that prove helpful in managing the network security. It is because the every
cluster node had information about the member nodes, and the base station manages the
topological information that further manages the network security in a significant manner.
Subjects
The belonging subject of the paper is information technology. It has been identified by
evaluating its topic and the work that has contained in the document. The main motive of the
paper is to implement a security model for wireless sensor networks and classify different attacks
of it. Therefore, it has been understood from this that the subject of the paper is information
technology. This is a quite popular subject of nowadays. It is because the technical advancements
and growth are growing nowadays (Pathan, 2016). Therefore, the growing growth of technical
advancements gives birth to technological subjects that further helpful in giving significant
knowledge about the information technology and its related measures.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/14cbd64c-9285-4e45-9ade-6b03eb1caf63-page-5.webp)
Literature Review Analysis 5
Instrumentation
In order to collect the necessary information, a large number of instruments had been utilized by
the writer of paper. The first and foremost instrument that the writer had been utilized to give
significant information is the secondary analysis. It means that the writer utilized the pre-
published articles and research papers to conclude his viewpoints in an effective manner. The
combination of the secondary research instruments helps the writers to come with the best
solution that can easily trust by the readers and the target audience (Holland, 2013). Apart of
this, the writers utilized the experimental study to implement the new model in order to resolve
the security problem of the people. This has been done specifically by experimental research
analysis. Therefore, it can be said that the writers used a large combination of instruments in
order to give the conclusion of their paper.
Data Collection, Presentation, and Analysis
It has been discussed earlier, that the writer used the secondary research methods to collect the
necessary data to give conclusion and resolve the research problem in an effective manner. The
presentation of facts and figures that have been done in the paper is quite relevant and effective
for the target audience (VamsiRam, 2012). It is because the combination of facts and figures
enhances their understanding regarding the research topic in clear context. Apart of this, the
analysis of facts and figures has been done in an effective manner. This has been performed by
using the exploratory research study. With the help of this research analysis, the writers able to
offer the best solution to their identified research problem of security in networks.
Summary and Discussion
On the basis of the analysis of information presented in the research paper, it can be said that the
writers identified a good and effective security model which addresses three important types of
Instrumentation
In order to collect the necessary information, a large number of instruments had been utilized by
the writer of paper. The first and foremost instrument that the writer had been utilized to give
significant information is the secondary analysis. It means that the writer utilized the pre-
published articles and research papers to conclude his viewpoints in an effective manner. The
combination of the secondary research instruments helps the writers to come with the best
solution that can easily trust by the readers and the target audience (Holland, 2013). Apart of
this, the writers utilized the experimental study to implement the new model in order to resolve
the security problem of the people. This has been done specifically by experimental research
analysis. Therefore, it can be said that the writers used a large combination of instruments in
order to give the conclusion of their paper.
Data Collection, Presentation, and Analysis
It has been discussed earlier, that the writer used the secondary research methods to collect the
necessary data to give conclusion and resolve the research problem in an effective manner. The
presentation of facts and figures that have been done in the paper is quite relevant and effective
for the target audience (VamsiRam, 2012). It is because the combination of facts and figures
enhances their understanding regarding the research topic in clear context. Apart of this, the
analysis of facts and figures has been done in an effective manner. This has been performed by
using the exploratory research study. With the help of this research analysis, the writers able to
offer the best solution to their identified research problem of security in networks.
Summary and Discussion
On the basis of the analysis of information presented in the research paper, it can be said that the
writers identified a good and effective security model which addresses three important types of
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/9e7960d0-ab5d-4b68-adf8-519f2a5ea7c2-page-6.webp)
Literature Review Analysis 6
active attacks. These attacks are known as a Replay attack, Clone attack, and MITM attack. They
introduced their new model with the help of Zero Knowledge Protocol. The identified model of
maintaining security mainly utilizes the finger print for every communication between the nodes.
Therefore, it becomes easy for the administrator to evaluate these attacks by using the ZKP
(Ram, 2012). Therefore, it can be said that the writers give sufficient attention towards the
development of the secured network features.
Research Type
In this research paper, the writer had followed two research types. These are experimental and
the descriptive research. The experimental research had been utilized by the writer to perform an
experiment of introducing a suitable model in order to resolve the research problem. On the other
hand, the descriptive research had been followed by the researcher to collect the necessary
information about the security attacks and the other security models used by the other
organizations in order to maintain the security (VamsiRam, 2012).
Overall Evaluation
On the basis of the given information, it has been identified that the researcher had performed
significant efforts in attempting his research work. The researcher did not only come with the
relevant security models but also evaluate their importance in managing the security in different
nodes of the networks. On the other hand, it can be said that the researcher identified a well-
known model known as ZKP in order to maintain the security in different network nodes (Ram,
2012). Moreover, the paper comes with relevant information on wireless security networks that
have enough potential to improve the understanding of the other authors as well as the potential
target audiences.
active attacks. These attacks are known as a Replay attack, Clone attack, and MITM attack. They
introduced their new model with the help of Zero Knowledge Protocol. The identified model of
maintaining security mainly utilizes the finger print for every communication between the nodes.
Therefore, it becomes easy for the administrator to evaluate these attacks by using the ZKP
(Ram, 2012). Therefore, it can be said that the writers give sufficient attention towards the
development of the secured network features.
Research Type
In this research paper, the writer had followed two research types. These are experimental and
the descriptive research. The experimental research had been utilized by the writer to perform an
experiment of introducing a suitable model in order to resolve the research problem. On the other
hand, the descriptive research had been followed by the researcher to collect the necessary
information about the security attacks and the other security models used by the other
organizations in order to maintain the security (VamsiRam, 2012).
Overall Evaluation
On the basis of the given information, it has been identified that the researcher had performed
significant efforts in attempting his research work. The researcher did not only come with the
relevant security models but also evaluate their importance in managing the security in different
nodes of the networks. On the other hand, it can be said that the researcher identified a well-
known model known as ZKP in order to maintain the security in different network nodes (Ram,
2012). Moreover, the paper comes with relevant information on wireless security networks that
have enough potential to improve the understanding of the other authors as well as the potential
target audiences.
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/90310271-3d5d-4dcf-9bcc-0e30904b3614-page-7.webp)
Literature Review Analysis 7
A Survey on Wireless Security: Technical Challenges, Recent
advances, and future Trends
Research Problem
The research problem identified in the paper is the vulnerability in wireless transmission and
wired communication (Zou, 2016). It has been concluded in the research paper that due to the
broadcast nature of radio propagation, the wireless air interface is accessible and open to both
illegitimate and unauthorized users. Therefore, there is a great possibility of vulnerability in the
wired communication and the wireless information transmission. Apart from this, it is also said
that the radio propagation and the wireless air interface connected to each other through cables
and a node without the direction Association. So, there is the high chance of vulnerability in
wireless information transfer and the communication. The researcher in the paper focused on the
wireless security by identifying its challenges, recent advancements, and the future trends.
Literature Review
It is concluded by the Soh (2015) that wireless security design is the combination of eight
different factors. These factors are known as complexity, intercept probability, secrecy capacity,
channel characteristic, authentication, authorization, latency, and encryption. The combination of
all these factors further demonstrates the design of wireless security. Apart of this, Yang (2015)
said that the wireless networks generally adopted the open systems interconnection protocol
architecture to evaluate the security threats and detect vulnerabilities in wireless communication.
It is being used broadly because it integrates the different application layers like physical,
transport, medium access control, and network layer.
A Survey on Wireless Security: Technical Challenges, Recent
advances, and future Trends
Research Problem
The research problem identified in the paper is the vulnerability in wireless transmission and
wired communication (Zou, 2016). It has been concluded in the research paper that due to the
broadcast nature of radio propagation, the wireless air interface is accessible and open to both
illegitimate and unauthorized users. Therefore, there is a great possibility of vulnerability in the
wired communication and the wireless information transmission. Apart from this, it is also said
that the radio propagation and the wireless air interface connected to each other through cables
and a node without the direction Association. So, there is the high chance of vulnerability in
wireless information transfer and the communication. The researcher in the paper focused on the
wireless security by identifying its challenges, recent advancements, and the future trends.
Literature Review
It is concluded by the Soh (2015) that wireless security design is the combination of eight
different factors. These factors are known as complexity, intercept probability, secrecy capacity,
channel characteristic, authentication, authorization, latency, and encryption. The combination of
all these factors further demonstrates the design of wireless security. Apart of this, Yang (2015)
said that the wireless networks generally adopted the open systems interconnection protocol
architecture to evaluate the security threats and detect vulnerabilities in wireless communication.
It is being used broadly because it integrates the different application layers like physical,
transport, medium access control, and network layer.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/bc578abe-51c5-4c0f-a802-35312114a634-page-8.webp)
Literature Review Analysis 8
Subjects
The subject of which the paper belongs is information technology. It is the major subject and
further integrates with different sub-set of subjects. Therefore, it can be said that the subject is
focused in the research paper is the wireless technology and communication. This subject is quite
popular and widely utilized by young generation nowadays. One can easily see a large number of
examples of wireless technologies nowadays. These may contain the Smartphone and other
sensors that automatically detect the things without any wire. Furthermore, it can be said that the
subject discussed in the research paper is quite popular recently. It happens due to the continuous
evolution and development in the technological sector.
Instrumentation
The instrument that has been utilized by the researchers in this paper is the primary research
methods. From the primary research methods, the researchers had been selected the Survey
method in order to collect the required information from the target audience in effective manner.
The survey method had been selected because it has more potential to awarding the research with
better findings and conclusion. Therefore, the researchers proceed with that to discuss the
relevant technological advancements, and future of wireless technology significantly.
Data Collection, Presentation, and Analysis
It is discussed earlier that the researchers of the paper used the wide varieties of primary sources
to collect the necessary information. These sources mainly contain the survey and the
observation. With the help of survey method, the researcher collects the different views of target
audiences regarding the future and current cellular networks. On the other hand, the presentation
has been performed by the researcher by utilizing the attractive tools and techniques such as
Subjects
The subject of which the paper belongs is information technology. It is the major subject and
further integrates with different sub-set of subjects. Therefore, it can be said that the subject is
focused in the research paper is the wireless technology and communication. This subject is quite
popular and widely utilized by young generation nowadays. One can easily see a large number of
examples of wireless technologies nowadays. These may contain the Smartphone and other
sensors that automatically detect the things without any wire. Furthermore, it can be said that the
subject discussed in the research paper is quite popular recently. It happens due to the continuous
evolution and development in the technological sector.
Instrumentation
The instrument that has been utilized by the researchers in this paper is the primary research
methods. From the primary research methods, the researchers had been selected the Survey
method in order to collect the required information from the target audience in effective manner.
The survey method had been selected because it has more potential to awarding the research with
better findings and conclusion. Therefore, the researchers proceed with that to discuss the
relevant technological advancements, and future of wireless technology significantly.
Data Collection, Presentation, and Analysis
It is discussed earlier that the researchers of the paper used the wide varieties of primary sources
to collect the necessary information. These sources mainly contain the survey and the
observation. With the help of survey method, the researcher collects the different views of target
audiences regarding the future and current cellular networks. On the other hand, the presentation
has been performed by the researcher by utilizing the attractive tools and techniques such as
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/a88be4d6-27ad-4b3b-89e8-e75587c8e47e-page-9.webp)
Literature Review Analysis 9
descriptive statement, and the tabular formats to highlight significant information. Therefore, it
can be said that the researcher conducted the research in a well-organized manner.
Summary and Discussion
After studying the paper, it has been identified that the wireless communication can be disrupted
by a large number of means such as physical layer by transmitting an interfering signal. On the
other hand, it is also evaluated that a large number of innovations has been taking place in the
wireless communication. These innovations are in the form of Smartphone and wireless radios.
Furthermore, it also has been evaluated that the artificial noise generation technique has great
potential of offering the wireless physical layer network security. That's why it can be said that
wireless security is a growing concern in today's scenario.
Research Type
The descriptive research style has been utilized in this paper (Zou, 2016). It is because the
information that requires by the researcher was in the form of description that can only collect by
using the descriptive research means and sources.
Overall Evaluation
The overall evaluation of the paper evaluated that the artificial noise generation technique has
great potential of offering the wireless physical layer network security (Zou, 2016). That’s why it
can be said that wireless security is a growing concern in today’s scenario.
Conclusion
On the basis of literature review analysis of both papers, it has been identified that both are
sharing a good information about the wireless network security and their measures. Both of these
descriptive statement, and the tabular formats to highlight significant information. Therefore, it
can be said that the researcher conducted the research in a well-organized manner.
Summary and Discussion
After studying the paper, it has been identified that the wireless communication can be disrupted
by a large number of means such as physical layer by transmitting an interfering signal. On the
other hand, it is also evaluated that a large number of innovations has been taking place in the
wireless communication. These innovations are in the form of Smartphone and wireless radios.
Furthermore, it also has been evaluated that the artificial noise generation technique has great
potential of offering the wireless physical layer network security. That's why it can be said that
wireless security is a growing concern in today's scenario.
Research Type
The descriptive research style has been utilized in this paper (Zou, 2016). It is because the
information that requires by the researcher was in the form of description that can only collect by
using the descriptive research means and sources.
Overall Evaluation
The overall evaluation of the paper evaluated that the artificial noise generation technique has
great potential of offering the wireless physical layer network security (Zou, 2016). That’s why it
can be said that wireless security is a growing concern in today’s scenario.
Conclusion
On the basis of literature review analysis of both papers, it has been identified that both are
sharing a good information about the wireless network security and their measures. Both of these
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/195c5bc0-972a-492e-9885-533b2d09658a-page-10.webp)
Literature Review Analysis 10
papers have great potential of satisfying their target audience in a great manner and enhance their
existing knowledge on the subject of information technology and its other sub-subjects.
papers have great potential of satisfying their target audience in a great manner and enhance their
existing knowledge on the subject of information technology and its other sub-subjects.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/44af06e5-42da-4b6b-8756-65fe153fee66-page-11.webp)
Literature Review Analysis 11
References
Diffie, W., & Hellman, M. E. (2014). Privacy and authentication: an introduction to layer
security in multiuser wireless network: a survey. IEEE Communication Surveys Tutorials, 16(3),
1550-1573.
El-Hawary, M. E. (2014). The smart grid—state-of-the-art and future trends. Electric Power
Components and Systems, 42(3-4), 239-250.
Holland, G. D., & El Defrawy, K. M. (2013). U.S. Patent No. 8,612,743. Washington, DC: U.S.
Patent and Trademark Office.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
Ram, K. V., & Venkateswarlu, I. B. (2012). Network Security Management in Wireless
Networks through Zero Knowledge Proof [J]. International Journal of Advanced Research in
Computer Science and Software Engineering, 2(9), 185-191.
Soh, P. J., Vandenbosch, G. A., Mercuri, M., & Schreurs, D. M. P. (2015). Wearable wireless
health monitoring: Current developments, challenges, and future trends. IEEE Microwave
Magazine, 16(4), 55-70.
VamsiRam, K., & Venkateswarlu, B. I. (2012). Network Security Management in Wireless
Networks through Zero Knowledge Proof. International Journal of Advanced Research in
Computer Science and Software Engineering, 2(9), 185-191.
References
Diffie, W., & Hellman, M. E. (2014). Privacy and authentication: an introduction to layer
security in multiuser wireless network: a survey. IEEE Communication Surveys Tutorials, 16(3),
1550-1573.
El-Hawary, M. E. (2014). The smart grid—state-of-the-art and future trends. Electric Power
Components and Systems, 42(3-4), 239-250.
Holland, G. D., & El Defrawy, K. M. (2013). U.S. Patent No. 8,612,743. Washington, DC: U.S.
Patent and Trademark Office.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
Ram, K. V., & Venkateswarlu, I. B. (2012). Network Security Management in Wireless
Networks through Zero Knowledge Proof [J]. International Journal of Advanced Research in
Computer Science and Software Engineering, 2(9), 185-191.
Soh, P. J., Vandenbosch, G. A., Mercuri, M., & Schreurs, D. M. P. (2015). Wearable wireless
health monitoring: Current developments, challenges, and future trends. IEEE Microwave
Magazine, 16(4), 55-70.
VamsiRam, K., & Venkateswarlu, B. I. (2012). Network Security Management in Wireless
Networks through Zero Knowledge Proof. International Journal of Advanced Research in
Computer Science and Software Engineering, 2(9), 185-191.
![Document Page](https://desklib.com/media/document/docfile/pages/literature-review-analysis-mnxd/2024/09/14/63d577db-d207-4bb7-aea0-e0612a229402-page-12.webp)
Literature Review Analysis 12
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Di Renzo, M. (2015). Safeguarding
5G wireless communication networks using physical layer security. IEEE Communications
Magazine, 53(4), 20-27.
Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical
challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727-1765.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Di Renzo, M. (2015). Safeguarding
5G wireless communication networks using physical layer security. IEEE Communications
Magazine, 53(4), 20-27.
Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical
challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727-1765.
1 out of 12
Related Documents
![[object Object]](/_next/image/?url=%2F_next%2Fstatic%2Fmedia%2Flogo.6d15ce61.png&w=640&q=75)
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.