Wireless Network and Security Name of the University Author's Name
VerifiedAdded on 2021/06/17
|9
|2695
|285
AI Summary
Performance of Wireless Network 6 Conclusion 6 References 7 Introduction The wireless network is the type of network that enables various devices in staying connected with the network; however roam un tethered with other wires [8]. Comparison of 3 Wireless Communication Technologies The comparison between satellite communication technology, wireless fidelity and Worldwide Interoperability for Microwave Access is as follows: Main Factors Satellite communication Technology Wireless Fidelity Worldwide Interoperability for Microwave Access i) Communication Spectrum Communication spectrum refers to the bandwidth spectrum. The frequency band for IEEE 802.11a is
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: WIRELESS NETWORK AND SECURITY
Wireless Network and Security
Name of the Student
Name of the University
Author’s Note:
Wireless Network and Security
Name of the Student
Name of the University
Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
WIRELESS NETWORK AND SECURITY
Table of Contents
Introduction...........................................................................................................................................2
Discussion..............................................................................................................................................2
1. Comparison of 3 Wireless Communication Technologies..............................................................2
2. Evaluation of Wireless Communication Standards for Cyber Physical Systems and IoT................4
3. Performance of Wireless Network.................................................................................................6
Conclusion.............................................................................................................................................6
References.............................................................................................................................................7
WIRELESS NETWORK AND SECURITY
Table of Contents
Introduction...........................................................................................................................................2
Discussion..............................................................................................................................................2
1. Comparison of 3 Wireless Communication Technologies..............................................................2
2. Evaluation of Wireless Communication Standards for Cyber Physical Systems and IoT................4
3. Performance of Wireless Network.................................................................................................6
Conclusion.............................................................................................................................................6
References.............................................................................................................................................7
2
WIRELESS NETWORK AND SECURITY
Introduction
The wireless network is the type of network that enables various devices in staying
connected with the network; however roam un tethered with other wires [8]. The access points
eventually amplify the signals of wireless fidelity for the reason that the device could be kept
extremely far from the router and still lined with the network. The benefit of this wireless network
mainly includes being absolutely convenient, i.e. it can access the resources of the network from all
locations within the coverage area of the wireless network or even from any Wi-Fi connected region.
Moreover, this type of network provides high productivity and easy collaboration [1]. Due to these
above mentioned advantages or benefits, wireless networks are taken by various organizations or
individuals. There are several technologies of this wireless communication network.
The following report will be outlining a brief discussion on wireless network and all its
technologies or applications. This report will be substantially focusing on the three important types
of wireless communication technologies and thus providing a detailed comparison between them.
Moreover, there are various standards of wireless communication and they would be evaluated on
the basis of Internet of Things and CPS or cyber physical systems. Furthermore, the best network
would be selected on the basis of its performance.
Discussion
1. Comparison of 3 Wireless Communication Technologies
The comparison between satellite communication technology, wireless fidelity and
Worldwide Interoperability for Microwave Access is as follows:
Main Factors Satellite communication
Technology
Wireless Fidelity Worldwide
Interoperability for
Microwave Access
i)
Communicatio
n Spectrum
Communication spectrum
refers to the bandwidth
spectrum. There are
various communication
spectra in several
networking devices [13].
The six bands of satellite
communication are Ka
The communication
spectrum of Wi-Fi or
wireless fidelity is
separate in various
locations in all over the
world. There are several
protocols present in the
wide domain of IEEE
The communication
spectrum of WiMax is
separate in various
locations in all over the
world. Two protocols are
utilized. They are IEEE
802.16d and IEEE
802.16e. For IEEE
WIRELESS NETWORK AND SECURITY
Introduction
The wireless network is the type of network that enables various devices in staying
connected with the network; however roam un tethered with other wires [8]. The access points
eventually amplify the signals of wireless fidelity for the reason that the device could be kept
extremely far from the router and still lined with the network. The benefit of this wireless network
mainly includes being absolutely convenient, i.e. it can access the resources of the network from all
locations within the coverage area of the wireless network or even from any Wi-Fi connected region.
Moreover, this type of network provides high productivity and easy collaboration [1]. Due to these
above mentioned advantages or benefits, wireless networks are taken by various organizations or
individuals. There are several technologies of this wireless communication network.
The following report will be outlining a brief discussion on wireless network and all its
technologies or applications. This report will be substantially focusing on the three important types
of wireless communication technologies and thus providing a detailed comparison between them.
Moreover, there are various standards of wireless communication and they would be evaluated on
the basis of Internet of Things and CPS or cyber physical systems. Furthermore, the best network
would be selected on the basis of its performance.
Discussion
1. Comparison of 3 Wireless Communication Technologies
The comparison between satellite communication technology, wireless fidelity and
Worldwide Interoperability for Microwave Access is as follows:
Main Factors Satellite communication
Technology
Wireless Fidelity Worldwide
Interoperability for
Microwave Access
i)
Communicatio
n Spectrum
Communication spectrum
refers to the bandwidth
spectrum. There are
various communication
spectra in several
networking devices [13].
The six bands of satellite
communication are Ka
The communication
spectrum of Wi-Fi or
wireless fidelity is
separate in various
locations in all over the
world. There are several
protocols present in the
wide domain of IEEE
The communication
spectrum of WiMax is
separate in various
locations in all over the
world. Two protocols are
utilized. They are IEEE
802.16d and IEEE
802.16e. For IEEE
3
WIRELESS NETWORK AND SECURITY
band, Ku band, X band, C
band, S band and L band.
The respective spectra are
26 to 40 GHz, 12 to 18 GHz,
8 to 12 GHz, 4 to 8 GHz, 2
to 4 GHz and 1 to 2 GHz.
The most used band
amongst these is Ku band.
802.11. Each and every
protocol has its
respective frequency
band. The frequency
band for IEEE 802.11a is 5
GHz, the frequency band
for IEEE 802.11b is 2.4
GHz, the frequency band
for IEEE 802.11g is 2.4
GHz, the frequency band
for IEEE 802.11n is 5 GHz,
the frequency band for
IEEE 802.11ac is 6 GHz,
the frequency band for
IEEE 802.11ad is up to 60
GHz, the frequency band
for IEEE 802.11af is below
1 GHz and the frequency
band for IEEE 802.11ah is
700 MHz.
802.16d, the most
utilized frequencies are
3.5 GHZ and 5.8 GHz. For
IEEE 802.16e, the most
utilized frequencies are
2.3 GHz, 2.5 GHz and 3.5
GHz [1].
ii) Modulation
Techniques
There are three techniques
for modulation in satellite.
They are orthogonal
quadrature phase shift
keying or OQPSK,
quadrature phase shift
keying or QPSK and binary
phase shift keying or BPSK
[3].
There are two distinct
techniques for
modulation in wireless
fidelity. They are
Quadrature Phase Shift
Keying or QPSK and
complementary coded
keying or CCK.
There are four distinct
techniques for
modulation in WiMax.
They are 64 QAM or 64
quadrature amplitude
modulation, 16 QAM or
16 quadrature amplitude
modulation, QPSK or
quadrature phase shift
keying and BPSK or
binary phase shift keying
[11].iii) Medium
Access
The MAC protocols of
satellite technology are
The MAC of Wi-Fi is
completely on the basis
The MAC protocols of
WiMax are utilized for
WIRELESS NETWORK AND SECURITY
band, Ku band, X band, C
band, S band and L band.
The respective spectra are
26 to 40 GHz, 12 to 18 GHz,
8 to 12 GHz, 4 to 8 GHz, 2
to 4 GHz and 1 to 2 GHz.
The most used band
amongst these is Ku band.
802.11. Each and every
protocol has its
respective frequency
band. The frequency
band for IEEE 802.11a is 5
GHz, the frequency band
for IEEE 802.11b is 2.4
GHz, the frequency band
for IEEE 802.11g is 2.4
GHz, the frequency band
for IEEE 802.11n is 5 GHz,
the frequency band for
IEEE 802.11ac is 6 GHz,
the frequency band for
IEEE 802.11ad is up to 60
GHz, the frequency band
for IEEE 802.11af is below
1 GHz and the frequency
band for IEEE 802.11ah is
700 MHz.
802.16d, the most
utilized frequencies are
3.5 GHZ and 5.8 GHz. For
IEEE 802.16e, the most
utilized frequencies are
2.3 GHz, 2.5 GHz and 3.5
GHz [1].
ii) Modulation
Techniques
There are three techniques
for modulation in satellite.
They are orthogonal
quadrature phase shift
keying or OQPSK,
quadrature phase shift
keying or QPSK and binary
phase shift keying or BPSK
[3].
There are two distinct
techniques for
modulation in wireless
fidelity. They are
Quadrature Phase Shift
Keying or QPSK and
complementary coded
keying or CCK.
There are four distinct
techniques for
modulation in WiMax.
They are 64 QAM or 64
quadrature amplitude
modulation, 16 QAM or
16 quadrature amplitude
modulation, QPSK or
quadrature phase shift
keying and BPSK or
binary phase shift keying
[11].iii) Medium
Access
The MAC protocols of
satellite technology are
The MAC of Wi-Fi is
completely on the basis
The MAC protocols of
WiMax are utilized for
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
WIRELESS NETWORK AND SECURITY
Control
Mechanism
frequency division multiple
access or FDMA and time
division multiple access or
TDMA
of IEEE 802.11
specifications.
fulfilling all the
connections of point-to-
multipoint orientation
[6].iv) Network
Technologies
Switched topology, point to
point topology and hybrid
topology.
Black-haul topology and
mesh topology.
AP based topology,
point-to-multipoint
bridge topology.
2. Evaluation of Wireless Communication Standards for Cyber Physical Systems and IoT
The wireless communication standards refer to those types of standards that support the
varying levels for communication and thus helping the user. There are various types of wireless
communication standards that are widely accepted by the users and also provide necessary range of
balance, throughput of network and mobility to devices [9]. The enhancement of these standards is
extremely important for the network. The wireless sensors that are connected by IoT are centralized
for the designing of CPS. Thus, the security is extremely high with this integration.
The significant evaluation of various wireless communication standards for the cyber
physical systems ad Internet of Things are given below:
i)
UHF RFID and NFC: The ultra high frequency RFID is the newest form for RFID where the
frequency is extremely high [12]. In the Internet of Things, the data acquisition is checked to meet
each and every requirement. The perception layer of the Internet of Things requires practical
requirements to be fulfilled and as consumption of power is very low in UHF RFID, it is capable of
doing so. In case of cyber physical systems, the computational entities are easily combined with the
physical systems [5]. The RFID of ultra high frequency is a basic form of cyber physical systems since
the storage functions and controlling elements are present within it.
NFC or simply the Near Field Communication is a collection of protocols that are utilized for
communication and hence enabling a secured connection between the two. The restriction is that
presence of smart phone is required here. The most significant advantages of the i0ntegration of
Near Field Communication and Internet of Things mainly involve energy saving, higher security,
convenience and many other. The medical field gets a huge benefit from this integration [3]. In case
of cyber physical systems, NFC is responsible for stopping the eavesdropping and relay attacks on
the computer devices.
WIRELESS NETWORK AND SECURITY
Control
Mechanism
frequency division multiple
access or FDMA and time
division multiple access or
TDMA
of IEEE 802.11
specifications.
fulfilling all the
connections of point-to-
multipoint orientation
[6].iv) Network
Technologies
Switched topology, point to
point topology and hybrid
topology.
Black-haul topology and
mesh topology.
AP based topology,
point-to-multipoint
bridge topology.
2. Evaluation of Wireless Communication Standards for Cyber Physical Systems and IoT
The wireless communication standards refer to those types of standards that support the
varying levels for communication and thus helping the user. There are various types of wireless
communication standards that are widely accepted by the users and also provide necessary range of
balance, throughput of network and mobility to devices [9]. The enhancement of these standards is
extremely important for the network. The wireless sensors that are connected by IoT are centralized
for the designing of CPS. Thus, the security is extremely high with this integration.
The significant evaluation of various wireless communication standards for the cyber
physical systems ad Internet of Things are given below:
i)
UHF RFID and NFC: The ultra high frequency RFID is the newest form for RFID where the
frequency is extremely high [12]. In the Internet of Things, the data acquisition is checked to meet
each and every requirement. The perception layer of the Internet of Things requires practical
requirements to be fulfilled and as consumption of power is very low in UHF RFID, it is capable of
doing so. In case of cyber physical systems, the computational entities are easily combined with the
physical systems [5]. The RFID of ultra high frequency is a basic form of cyber physical systems since
the storage functions and controlling elements are present within it.
NFC or simply the Near Field Communication is a collection of protocols that are utilized for
communication and hence enabling a secured connection between the two. The restriction is that
presence of smart phone is required here. The most significant advantages of the i0ntegration of
Near Field Communication and Internet of Things mainly involve energy saving, higher security,
convenience and many other. The medical field gets a huge benefit from this integration [3]. In case
of cyber physical systems, NFC is responsible for stopping the eavesdropping and relay attacks on
the computer devices.
5
WIRELESS NETWORK AND SECURITY
ii)
ZigBee and Z-Wave: Personal area network is accessed with the ZigBee protocol of IEEE
802.15. The expenses are very less in comparison to others. For the Internet of Things or IoT, the
protocol of ZigBee is integrated via ZigBee gateways [4]. It provides security and safety with proper
stability to the protocol. In case of cyber physical systems, ZigBee provides highest possible level of
security to the systems. Moreover, the lowest power microcontroller is used here, which is CC2530.
Thus, the power consumption will also be low.
Z-Wave is the next type of standard in wireless communication. The network that is present
within this network is mesh and thus connections are possible in all aspects. The radio waves that
are utilized here are of extremely lower energy and thus the energy consumption is also low. Z-Wave
powers the IoT or Internet of Things [10]. The devices that provide smart lighting of the Internet of
Things is the type of mesh network that allows communicate even from 100 feet distance. For the
CPS, Z-Wave is utilized in domains such automated vehicles and robotics.
iii)
Bluetooth and Bluetooth Low Energy: Bluetooth is the most easy way to transfer any type
of data such as images, videos and audios. The only restriction in this type of technology is that it
cannot cover huge distances [2]. The data transfer can only occur in short distances. In the IoT, the
main strong point of this technology is the easy communication and for cyber physical devices, the
technology of Bluetooth is linked with all the systems for providing various easy modes of
communication.
Bluetooth Low Energy or Bluetooth 4.0 is the next standard of wireless communication. In
the Internet of things, this type of connectivity is responsible for alerting the systems of house and
hence the crimes are reduced [7]. Several other applications are also involved with this technology.
In case of CPS, the Bluetooth low energy communicates amongst the master computer systems and
slave microcontrollers.
iv)
Cellular Systems: Cellular systems refer to the cell phones or networks that the cell phone
utilize for communication [14]. In the Internet of Things, the cellular systems are called CIoT or
Cellular Internet of Things. Three important and significant technologies are present in the Cellular
Internet of Things. They are EC GSM IoT, NB IoT and finally LTE M. Each and every technology is
extremely effective and efficient and hence the radio access is easier. In case of cyber physical
systems, the cellular systems are termed as cell phones or mobile cyber physical systems [1]. They
are used for providing several communication radios, computational resources, intelligent
applications and many more.
WIRELESS NETWORK AND SECURITY
ii)
ZigBee and Z-Wave: Personal area network is accessed with the ZigBee protocol of IEEE
802.15. The expenses are very less in comparison to others. For the Internet of Things or IoT, the
protocol of ZigBee is integrated via ZigBee gateways [4]. It provides security and safety with proper
stability to the protocol. In case of cyber physical systems, ZigBee provides highest possible level of
security to the systems. Moreover, the lowest power microcontroller is used here, which is CC2530.
Thus, the power consumption will also be low.
Z-Wave is the next type of standard in wireless communication. The network that is present
within this network is mesh and thus connections are possible in all aspects. The radio waves that
are utilized here are of extremely lower energy and thus the energy consumption is also low. Z-Wave
powers the IoT or Internet of Things [10]. The devices that provide smart lighting of the Internet of
Things is the type of mesh network that allows communicate even from 100 feet distance. For the
CPS, Z-Wave is utilized in domains such automated vehicles and robotics.
iii)
Bluetooth and Bluetooth Low Energy: Bluetooth is the most easy way to transfer any type
of data such as images, videos and audios. The only restriction in this type of technology is that it
cannot cover huge distances [2]. The data transfer can only occur in short distances. In the IoT, the
main strong point of this technology is the easy communication and for cyber physical devices, the
technology of Bluetooth is linked with all the systems for providing various easy modes of
communication.
Bluetooth Low Energy or Bluetooth 4.0 is the next standard of wireless communication. In
the Internet of things, this type of connectivity is responsible for alerting the systems of house and
hence the crimes are reduced [7]. Several other applications are also involved with this technology.
In case of CPS, the Bluetooth low energy communicates amongst the master computer systems and
slave microcontrollers.
iv)
Cellular Systems: Cellular systems refer to the cell phones or networks that the cell phone
utilize for communication [14]. In the Internet of Things, the cellular systems are called CIoT or
Cellular Internet of Things. Three important and significant technologies are present in the Cellular
Internet of Things. They are EC GSM IoT, NB IoT and finally LTE M. Each and every technology is
extremely effective and efficient and hence the radio access is easier. In case of cyber physical
systems, the cellular systems are termed as cell phones or mobile cyber physical systems [1]. They
are used for providing several communication radios, computational resources, intelligent
applications and many more.
6
WIRELESS NETWORK AND SECURITY
v)
IEEE 802.11p: It is the amendment of protocol of IEEE 802.11 [7]. This particular protocol
is extremely effective the moment it is enabled with Internet of Things. This protocol is used for
supporting the communication in vehicles. Smart transportation is the usability in the cyber physical
systems.
vi)
LPWAN: LPWAN or low power wide area network with the Internet of Things comprises
of several players such as Ingenu, Sigfox and Weightless SIG. They are extremely cost effective and
efficient [13]. For the Cyber physical systems, LPWAN is responsible for network connection with low
power consumption and high distance.
3. Performance of Wireless Network
After evaluating all the nine wireless networking standards for CPS and IoT, the suitable
network is UHF RFID. It is extremely effective as the bandwidth is maximum and the range area is
also high for this RFID. The range varies from 300 MHZ to 3 GHz. Hence, it is termed as the best of
all.
Conclusion
Therefore, from the above discussion, it can be concluded that wireless networks are the
new advancements in the networking world. It is the type of network that is being set up by utilizing
the radio signal frequencies in order to communicate within the network devices and computer
systems. This type of network is also referred to as the WLAN or Wireless fidelity network. The
feature of ease in setting up of the network makes the wireless network extremely popular and well
acceptable by all. Moreover, since no cables are involved in this network, the overall expenses are
reduced to a great extent and thus all the problems and complexities with the wires are removed
with this type of network. Moreover, the computers and the systems are easily connected with the
wireless networking and also in a cost effective way. The security of this type of network is also high
and there is almost chance of security issues in wireless networking. The protections to this security
are not required here; however, they do possess this type of security within the networks. The
above report has highlighted the topic of wireless networking with relevant details. A comparison
has been done on various technologies and standards have been evaluated. Finally the best network
has been selected.
WIRELESS NETWORK AND SECURITY
v)
IEEE 802.11p: It is the amendment of protocol of IEEE 802.11 [7]. This particular protocol
is extremely effective the moment it is enabled with Internet of Things. This protocol is used for
supporting the communication in vehicles. Smart transportation is the usability in the cyber physical
systems.
vi)
LPWAN: LPWAN or low power wide area network with the Internet of Things comprises
of several players such as Ingenu, Sigfox and Weightless SIG. They are extremely cost effective and
efficient [13]. For the Cyber physical systems, LPWAN is responsible for network connection with low
power consumption and high distance.
3. Performance of Wireless Network
After evaluating all the nine wireless networking standards for CPS and IoT, the suitable
network is UHF RFID. It is extremely effective as the bandwidth is maximum and the range area is
also high for this RFID. The range varies from 300 MHZ to 3 GHz. Hence, it is termed as the best of
all.
Conclusion
Therefore, from the above discussion, it can be concluded that wireless networks are the
new advancements in the networking world. It is the type of network that is being set up by utilizing
the radio signal frequencies in order to communicate within the network devices and computer
systems. This type of network is also referred to as the WLAN or Wireless fidelity network. The
feature of ease in setting up of the network makes the wireless network extremely popular and well
acceptable by all. Moreover, since no cables are involved in this network, the overall expenses are
reduced to a great extent and thus all the problems and complexities with the wires are removed
with this type of network. Moreover, the computers and the systems are easily connected with the
wireless networking and also in a cost effective way. The security of this type of network is also high
and there is almost chance of security issues in wireless networking. The protections to this security
are not required here; however, they do possess this type of security within the networks. The
above report has highlighted the topic of wireless networking with relevant details. A comparison
has been done on various technologies and standards have been evaluated. Finally the best network
has been selected.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
WIRELESS NETWORK AND SECURITY
References
[1] Burg, Andreas, Anupam Chattopadhyay, and Kwok-Yan Lam. "Wireless Communication and
Security Issues for Cyber–Physical Systems and the Internet-of-Things."
Proceedings of the IEEE 106,
no. 1 (2018): 38-60.
[2] Andrews, Jeffrey G., Xinchen Zhang, Gregory D. Durgin, and Abhishek K. Gupta. "Are we
approaching the fundamental limits of wireless network densification?."
IEEE Communications
Magazine 54, no. 10 (2016): 184-190.
[3] Dey, Kakan Chandra, Anjan Rayamajhi, Mashrur Chowdhury, Parth Bhavsar, and James Martin.
"Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous
wireless network–Performance evaluation."
Transportation Research Part C: Emerging
Technologies 68 (2016): 168-184.
[4] Xiao, Yang, ed.
Security in sensor networks. CRC Press, 2016.
[5] Pathan, Al-Sakib Khan, ed.
Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC
press, 2016.
[6] Zhou, Xiangyun, Yan Zhang, and Lingyang Song.
Physical layer security in wireless
communications. Crc Press, 2016.
[7] Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. "Physical layer security issues
in interference-alignment-based wireless networks."
IEEE Communications Magazine 54, no. 8
(2016): 162-168.
[8] Chen, Yuang, and Thomas Kunz. "Performance evaluation of IoT protocols under a constrained
wireless access network." In
Selected Topics in Mobile & Wireless Networking (MoWNeT), 2016
International Conference on, pp. 1-7. IEEE, 2016.
[9] Shin, Seungwon, Lei Xu, Sungmin Hong, and Guofei Gu. "Enhancing network security through
software defined networking (SDN)." In
Computer Communication and Networks (ICCCN), 2016 25th
International Conference on, pp. 1-9. IEEE, 2016.
[10] Liyanage, Madhusanka, Ahmed Bux Abro, Mika Ylianttila, and Andrei Gurtov. "Opportunities and
challenges of software-defined mobile networks in network security."
IEEE Security & Privacy 14, no.
4 (2016): 34-44.
WIRELESS NETWORK AND SECURITY
References
[1] Burg, Andreas, Anupam Chattopadhyay, and Kwok-Yan Lam. "Wireless Communication and
Security Issues for Cyber–Physical Systems and the Internet-of-Things."
Proceedings of the IEEE 106,
no. 1 (2018): 38-60.
[2] Andrews, Jeffrey G., Xinchen Zhang, Gregory D. Durgin, and Abhishek K. Gupta. "Are we
approaching the fundamental limits of wireless network densification?."
IEEE Communications
Magazine 54, no. 10 (2016): 184-190.
[3] Dey, Kakan Chandra, Anjan Rayamajhi, Mashrur Chowdhury, Parth Bhavsar, and James Martin.
"Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous
wireless network–Performance evaluation."
Transportation Research Part C: Emerging
Technologies 68 (2016): 168-184.
[4] Xiao, Yang, ed.
Security in sensor networks. CRC Press, 2016.
[5] Pathan, Al-Sakib Khan, ed.
Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC
press, 2016.
[6] Zhou, Xiangyun, Yan Zhang, and Lingyang Song.
Physical layer security in wireless
communications. Crc Press, 2016.
[7] Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. "Physical layer security issues
in interference-alignment-based wireless networks."
IEEE Communications Magazine 54, no. 8
(2016): 162-168.
[8] Chen, Yuang, and Thomas Kunz. "Performance evaluation of IoT protocols under a constrained
wireless access network." In
Selected Topics in Mobile & Wireless Networking (MoWNeT), 2016
International Conference on, pp. 1-7. IEEE, 2016.
[9] Shin, Seungwon, Lei Xu, Sungmin Hong, and Guofei Gu. "Enhancing network security through
software defined networking (SDN)." In
Computer Communication and Networks (ICCCN), 2016 25th
International Conference on, pp. 1-9. IEEE, 2016.
[10] Liyanage, Madhusanka, Ahmed Bux Abro, Mika Ylianttila, and Andrei Gurtov. "Opportunities and
challenges of software-defined mobile networks in network security."
IEEE Security & Privacy 14, no.
4 (2016): 34-44.
8
WIRELESS NETWORK AND SECURITY
[11] Mahgoub, Imad, and Mohammad Ilyas.
Sensor network protocols. CRC press, 2016.
[12] Sarkar, Subir Kumar, T. G. Basavaraju, and C. Puttamadappa.
Ad hoc mobile wireless networks:
principles, protocols, and applications. CRC Press, 2016. He, Debiao, Sherali Zeadally, Neeraj Kumar,
and Jong-Hyouk Lee. "Anonymous authentication for wireless body area networks with provable
security."
IEEE Systems Journal 11, no. 4 (2017): 2590-2601.
[13] He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. "Anonymous authentication
for wireless body area networks with provable security."
IEEE Systems Journal 11, no. 4 (2017):
2590-2601.
[14] Makimoto, Mitsuo, and Sadahiko Yamashita.
Microwave resonators and filters for wireless
communication: theory, design and application. Vol. 4. Springer Science & Business Media, 2013.
WIRELESS NETWORK AND SECURITY
[11] Mahgoub, Imad, and Mohammad Ilyas.
Sensor network protocols. CRC press, 2016.
[12] Sarkar, Subir Kumar, T. G. Basavaraju, and C. Puttamadappa.
Ad hoc mobile wireless networks:
principles, protocols, and applications. CRC Press, 2016. He, Debiao, Sherali Zeadally, Neeraj Kumar,
and Jong-Hyouk Lee. "Anonymous authentication for wireless body area networks with provable
security."
IEEE Systems Journal 11, no. 4 (2017): 2590-2601.
[13] He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. "Anonymous authentication
for wireless body area networks with provable security."
IEEE Systems Journal 11, no. 4 (2017):
2590-2601.
[14] Makimoto, Mitsuo, and Sadahiko Yamashita.
Microwave resonators and filters for wireless
communication: theory, design and application. Vol. 4. Springer Science & Business Media, 2013.
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.