Analyze the Research Paper: Wireless Network Security
Added on 2019-09-24
12 Pages2622 Words363 Views
|
|
|
Running Head: Literature Review AnalysisLiterature ReviewAnalysis
Literature Review Analysis2Table of ContentsIntroduction......................................................................................................................................2Network Security Management in Wireless Networks through Zero Knowledge Proof................2Research Problem........................................................................................................................2Literature Review.........................................................................................................................3Subjects........................................................................................................................................3Instrumentation............................................................................................................................4Data Collection, Presentation, and Analysis................................................................................4Summary and Discussion.............................................................................................................4Research Type..............................................................................................................................5Overall Evaluation.......................................................................................................................5A Survey on Wireless Security: Technical Challenges, Recent advances and future Trends.........6Research Problem........................................................................................................................6Literature Review.........................................................................................................................6Subjects........................................................................................................................................7Instrumentation............................................................................................................................7Data Collection, Presentation, and Analysis................................................................................7Summary and Discussion.............................................................................................................8Research Type..............................................................................................................................8Overall Evaluation.......................................................................................................................8Conclusion.......................................................................................................................................8References......................................................................................................................................10
Literature Review Analysis3IntroductionIn this paper, the literature review and findings of two different research articles on wireless network security have been analyzed. This has been done with the sole motive of collecting the viewpoint of both research scholars on the same topic. This will give us significant knowledge about the different aspects of the wireless network security. The two research papers that has been selected for this paper is "Network Security Management in Wireless Networks through Zero Knowledge Proof" and "A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends" The first research paper has been written by the K. VamsiRam, and I. Bala Venkateswarlu (Ram, 2012). On the other hand, the second paper has been written bythe Yulong Zou, Xiambin Wan, Lajos Hanzo, and Fellow (Zou, 2016). Both of the papers have given in-depth knowledge about the selected topic of wireless network security. This has been performed by using a large number of data collection tools and in-depth analysis. Therefore, it can be said that the both papers come with a relevant outcome with significant benefits for target audiences. Network Security Management in Wireless Networks through Zero Knowledge ProofResearch ProblemIn this paper, the research problem is network security which is being focused by the writer during this paper (Ram, 2012). It has been identified in the paper that security is one of the most important problems in wireless sensor networks. Therefore, with the help of this paper, the writer
Literature Review Analysis4wants to aware the public regarding the security threats, and attacks of WSN so that security can manage accordingly. Therefore, in his paper, the writer gives a mean to resolve the problem of security in information technology networks. This is known as the zero knowledge protocol. Thisprotocol is organized for the verification of sensor cloning attack which further secures the network in an effective manner.Literature Review Diffie (2014) said that the secondary and primary are the important types of security goals that can identify in the Wireless Sensor Network. The primary motives are known as the standard security goals like authentication, confidentiality, and the integrity. On the other hand, the secondary goals are time synchronization, secure localization, and the data freshness. Apart of this, El-Hawary (2014) concludes that the base station, cluster head, and member nodes are three important nodes that prove helpful in managing the network security. It is because the every cluster node had information about the member nodes, and the base station manages the topological information that further manages the network security in a significant manner.SubjectsThe belonging subject of the paper is information technology. It has been identified by evaluating its topic and the work that has contained in the document. The main motive of the paper is to implement a security model for wireless sensor networks and classify different attacksof it. Therefore, it has been understood from this that the subject of the paper is information technology. This is a quite popular subject of nowadays. It is because the technical advancementsand growth are growing nowadays (Pathan, 2016). Therefore, the growing growth of technical advancements gives birth to technological subjects that further helpful in giving significant knowledge about the information technology and its related measures.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents