logo

Wireless Network Security: Challenges and Relevant Technologies

   

Added on  2022-11-14

12 Pages3001 Words116 Views
Running head: WIRELESS NETWORK SECURITY
WIRELESS NETWORK SECURITY
Name of student
Name of university
Author’s note:

1
WIRELESS NETWORK SECURITY
Table of Contents
Introduction....................................................................................................................2
Relevant technologies....................................................................................................2
Challenges of wireless network.....................................................................................4
Literature gap.................................................................................................................6
Areas addressed..........................................................................................................6
Areas not addressed....................................................................................................7
Critical issue...............................................................................................................7
Conclusion......................................................................................................................7
Reference........................................................................................................................9

2
WIRELESS NETWORK SECURITY
Introduction
This report aims to discuss the topic of the wireless network and the security
challenges associated with this technology. The relevant technologies that are created from
the wireless network has been clearly mentioned in this report. The major challenges of the
wireless network has been clearly stated in this report. An extensive literature review has
been conducted for allowing the discovery of the gaps in the literature that is present for the
common people. The appropriate views has been provided by the analysis of the literature
review of the chosen topic. Lastly, this report concludes with the appropriate conclusion for
the report.
Any wireless network could be defined as the computer network that utilises the
connection of wireless data among the network nodes. The wireless networking could be
referred as the method using which at the homes, the telecommunications networks as well as
the business installation could be avoided and the costly process of the introduction of the
cables into the building or any connection among the several locations of the equipment. The
networks of the wireless telecommunications are commonly implemented and then
administered using the radio communication.
Relevant technologies
The relevant technologies that are powered by the wireless network could be
categorised as the RFID, NFC, and the ZigBee. The tags as well as the tag readers of the
RFID or the Radio Frequency Identification majorly utilises the proximity and it comprises of
the automated setup of the ad hoc for the transferring of the small amounts of the
information. The crucial characteristics of RFID tags are the fixed distinct identifier and the
required proximity of the tags to any tag reader (Liang & Yu, 2014). Moreover, several types
of the RFID tags are present in the market that cycles through the predefined list of the

3
WIRELESS NETWORK SECURITY
identifiers. Also the RFID tags has been developed by the manufacturers that are significantly
compatible with the WiFi networks for the extending of the location tracking to the complete
WiFi network, avoiding the requirement for the additional tracking of the network (Hu &
Qian, 2014). This cheapest variety of the RFID tags are also called as the passive even though
the reactive would mean more, due to the fact that the power is drawn from the power of the
transmitting from radio signal of tag reader. This technology is commonly utilised for the
tracking of the movement of the objects commonly at the distances of significant metres but
potentially upto the 200 metres with the active or the semi-active tags that are the connected
with the own source of the power (Liang, Yu & Zhang, 2015). The tags of the RFID are
vastly utilised for the controlling and the monitoring of the access using the gate and the door
entry systems.
NFC: Just as the RFID tags and the readers, the near field communication is the
wireless technology that is used for the short range communication and for the effective
transferring of the small amounts of the information. Moreover, the NFC solely operates
under the range of almost 20 centimeters but it is commonly less (Mitchell & Chen, 2014).
As with the RFID, it significantly differs from the other wireless networks like the WiFi and
it is significantly useful technology due to the fact it makes the proper utilisation of the
proximity and the automated ad hoc setup of the communication. The NFC is significantly
vast utilisation in the several countries in the contactless payment system with the various
new digital companies that are keen to keep the significant share of the market (Chen et al.,
2015).
ZigBee: This wireless network technology is significantly based on the various
features of the WiFi. These are specifically suitable for the defined application of the
machine-to-machine (Kamel, Le & Girard, 2014). Subsequently the ZigBee would be
significantly important in powerful Internet Of Things that provides the assurance of the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Working of RFID and NFC: Current Security Considerations and Challenges
|4
|662
|401

Implementation of IOT in Smart Transportation
|6
|4624
|210

Wireless Communication Protocols for Internet of Things (IoT)
|10
|902
|363

Wireless Network Security and Preventive Techniques
|11
|2804
|321

BUS530 - Use of IoT in RFID Systems
|16
|2848
|196