Network Security Management in Wireless Networks

Added on - 24 Sep 2019

  • 12

    pages

  • 2622

    words

  • 143

    views

  • 0

    downloads

Showing pages 1 to 4 of 12 pages
Running Head: Literature Review AnalysisLiterature ReviewAnalysis
Literature Review Analysis2Table of ContentsIntroduction......................................................................................................................................2Network Security Management in Wireless Networks through Zero Knowledge Proof................2Research Problem........................................................................................................................2Literature Review.........................................................................................................................3Subjects........................................................................................................................................3Instrumentation............................................................................................................................4Data Collection, Presentation, and Analysis................................................................................4Summary and Discussion.............................................................................................................4Research Type..............................................................................................................................5Overall Evaluation.......................................................................................................................5A Survey on Wireless Security: Technical Challenges, Recent advances and future Trends.........6Research Problem........................................................................................................................6Literature Review.........................................................................................................................6Subjects........................................................................................................................................7Instrumentation............................................................................................................................7Data Collection, Presentation, and Analysis................................................................................7Summary and Discussion.............................................................................................................8Research Type..............................................................................................................................8Overall Evaluation.......................................................................................................................8Conclusion.......................................................................................................................................8References......................................................................................................................................10
Literature Review Analysis3IntroductionIn this paper, the literature review and findings of two different research articles on wirelessnetwork security have been analyzed. This has been done with the sole motive of collecting theviewpoint of both research scholars on the same topic. This will give us significant knowledgeabout the different aspects of the wireless network security. The two research papers that hasbeen selected for this paper is "Network Security Management in Wireless Networks throughZero Knowledge Proof" and "A Survey on Wireless Security: Technical Challenges, RecentAdvances and Future Trends" The first research paper has been written by the K. VamsiRam,and I. Bala Venkateswarlu (Ram, 2012). On the other hand, the second paper has been written bythe Yulong Zou, Xiambin Wan, Lajos Hanzo, and Fellow (Zou, 2016). Both of the papers havegiven in-depth knowledge about the selected topic of wireless network security. This has beenperformed by using a large number of data collection tools and in-depth analysis. Therefore, itcan be said that the both papers come with a relevant outcome with significant benefits for targetaudiences.Network Security Management in Wireless Networks through ZeroKnowledge ProofResearch ProblemIn this paper, the research problem is network security which is being focused by the writerduring this paper (Ram, 2012). It has been identified in the paper that security is one of the mostimportant problems in wireless sensor networks. Therefore, with the help of this paper, the writer
Literature Review Analysis4wants to aware the public regarding the security threats, and attacks of WSN so that security canmanage accordingly. Therefore, in his paper, the writer gives a mean to resolve the problem ofsecurity in information technology networks. This is known as the zero knowledge protocol. Thisprotocol is organized for the verification of sensor cloning attack which further secures thenetwork in an effective manner.Literature ReviewDiffie (2014)said that the secondary and primary are the important types of security goals thatcan identify in the Wireless Sensor Network. The primary motives are known as the standardsecurity goals like authentication, confidentiality, and the integrity. On the other hand, thesecondary goals are time synchronization, secure localization, and the data freshness. Apart ofthis,El-Hawary (2014)concludes that the base station, cluster head, and member nodes are threeimportant nodes that prove helpful in managing the network security. It is because the everycluster node had information about the member nodes, and the base station manages thetopological information that further manages the network security in a significant manner.SubjectsThe belonging subject of the paper is information technology. It has been identified byevaluating its topic and the work that has contained in the document. The main motive of thepaper is to implement a security model for wireless sensor networks and classify different attacksof it. Therefore, it has been understood from this that the subject of the paper is informationtechnology. This is a quite popular subject of nowadays. It is because the technical advancementsand growth are growing nowadays (Pathan, 2016). Therefore, the growing growth of technicaladvancements gives birth to technological subjects that further helpful in giving significantknowledge about the information technology and its related measures.
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document