Wireless Network Security: Literature Review and Project Proposal

Verified

Added on  2023/06/13

|19
|4360
|328
AI Summary
This paper provides a literature review and project proposal on wireless network security, including research questions, search methods, and evaluation methodology. The literature review covers the standard security protocols of wireless technology, their effectiveness, and future security aspects. The project proposal outlines the research purpose, background context, research methodology, evaluation methodology, and schedule and publishing.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: WIRELESS NETWORK SECURITY
Wireless Network Security
Name of Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
WIRELESS NETWORK SECURITY
Table of Contents
Part1: Literature Search / Review....................................................................................................5
Introduction..................................................................................................................................5
Search Question...........................................................................................................................5
Search..........................................................................................................................................5
Assess results...............................................................................................................................6
Refine question............................................................................................................................6
Refine search...............................................................................................................................6
Assess Results..............................................................................................................................6
Refine Question...........................................................................................................................6
Refine search...............................................................................................................................6
Assess results...............................................................................................................................6
Criteria for Deciding the Relevance............................................................................................6
Conclusion...................................................................................................................................7
Part 2: Project Proposal...................................................................................................................7
Research Purpose.........................................................................................................................7
Background Context....................................................................................................................8
Security and Wireless Overview.............................................................................................8
Research Methodology................................................................................................................8
Evaluation Methodology.............................................................................................................8
Literature Review........................................................................................................................8
Introduction to Security...........................................................................................................8
Introduction to the Wireless World.......................................................................................13
WMAN (Wireless MAN)......................................................................................................13
WLAN (Wireless LAN)........................................................................................................14
Security Breaches..................................................................................................................14
Security in WMAN (802.16).....................................................................................................15
Protocol Layers......................................................................................................................15
Security Concerns..................................................................................................................16
Security in WLAN (802.11)......................................................................................................17
802.11 standard......................................................................................................................17
(Wired Equivalent Privacy) WEP..........................................................................................18
WEP Weaknesses..................................................................................................................18
802.1x: EAP Over LAN (EAPOL)........................................................................................18
Document Page
3
WIRELESS NETWORK SECURITY
Schedule and Publishing............................................................................................................19
Gantt chart.............................................................................................................................20
Professional and Ethical Issues..................................................................................................20
Findings.....................................................................................................................................21
Aspects of Wireless Security.................................................................................................21
Conclusion.................................................................................................................................22
References......................................................................................................................................23
Document Page
4
WIRELESS NETWORK SECURITY
Part1: Literature Search / Review
Introduction
Wireless network has become the integral part of the life as; technology advancement has
been changing the face of the world continuously. Technologies such as Internet of Things, WI -
FI, Bluetooth, Internet, WLAN, WMAN, and many more have become very popular and are
being applicable in every sector of the world in the present time. The wireless network came in
practice after 2000 when the prices for the wireless network went down, as previously, the
military were the biggest client of the networks. Wireless security can be defined as the
capability of the system to maintain and manage the protection for the network and allow safer
exchange of data and information.
Search Question
The research question emphasizes on the identification of the security standards available
in the present world and analyzes their effectiveness within the existing network. Following are
the questions for which, the literature review will be made:
What are the standard security protocols of wireless technology?
Available security protocols are capable of eliminating all the possible threats or not?
What are the aspects for the security of the wireless technology in future?
Search
First attempt was driven through searching the Teesside University library’s online
databases with the search code “Wireless Network.”

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5
WIRELESS NETWORK SECURITY
Assess results
Many articles link appeared and they had many information related to the wireless
network however, security was missing in most of the papers.
Refine question
Thereafter, search attempts were made for the wireless network and security
Refine search
Search was modified from wireless network to wireless network and security
Assess Results
Most of the articles were relevant to the topic and they had many information related to
the wireless network and security including old and new ones
Refine Question
Present wireless network security protocols needed to be identified
Refine search
Wireless and network security protocols was searched in the database
Assess results
Identified many papers relevant to the topic
Criteria for Deciding the Relevance
A primary criterion was the date of the paper uploaded in the database that was filtered
from 2014 to 2017 to identify the articles with latest information on the topics. Thereafter,
articles chosen from the first search assesses were sorted out as per the information and primary
researches made on the same topic. The articles were sorted out considering the type of research
Document Page
6
WIRELESS NETWORK SECURITY
methodology used for the findings and results in the research paper. The articles those have the
primary research analysis driven were selected for the review. Some of the articles were out of
the box because of the old data availability and not introducing the new protocols and
approaches driven for the project. Finally, the articles and research papers following these
criteria are selected as the chosen papers for the literature review.
Conclusion
The above criteria helped in identifying the relevant papers on the related topics. Total
nineteen research papers were selected for the literature review as mentioned in the reference
section of this paper. These papers had all the relevant data and information those needed to be
evaluated for identifying the answers of the research questions and assuring the efficiency of the
findings and results for this paper.
Part 2: Project Proposal
1. Research purpose
Wireless networks are a revolutionary progression in the world of technology that would
be under constant upgrading. This latest implementation in the networking era would be able to
reduce costs at a huge level since the technology has eradicated the use of cables, enabling
mobility and agility in networking. However, since the inception of this revolution in the world
of wireless networking, there would be immense usability of the services offered.
The most common and popular is the mobility factor that wireless networking offers.
Since, this network also enables the virtualization of networks and the sharing of infrastructure,
there might be a possibility about the security feature that the technology has to offer. There can
be a possibility that due to a shared facility available in the networking system, security takes a
Document Page
7
WIRELESS NETWORK SECURITY
backseat in the structure. Wireless features are not found to be inherently secured. The nodes that
are deployed near the communication channels in the wireless networks can possess malicious
adversaries. Besides this, if any malicious attacker gets the access to one of the nodes that induce
the interconnection; it can bring about hacking possibilities as well.
The wireless network also expands the technology to the advanced usage of sensory
networks and the sharing of infrastructures over radio spectrum resources. Although it reduces
the expenses of network deploying, the network system does not possess complete permeability
to the malicious hackers and even the malware attacks.
Therefore, it needs to be researched upon about the malevolent security issues that the
wireless network possesses despite having the potential vision about the virtualization of
network. The security challenges that wireless network has can be addressed over the widespread
deployment of the technology that happens to include the likes of isolation, allocation, resource
discovery, control signaling, mobility management, and operation security of the network
management. The research purpose analyzes the situation over these factors to identify the
several important issues in these networking structures with the help of primary and secondary
data collection method about the security issues.
2. Background context
During the times where networking could not introduce the factor of using wireless
technology, the cost for implementing the networking technology was high. The further
technological advancements also introduced costly frameworks till wireless services were
introduced. The introduction of the wireless networking structure had reduced the cost of
implementation of the networking even over a huge selection of area. The virtualization into

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
WIRELESS NETWORK SECURITY
cloud environment had even been implemented into the wired technology, but the wireless
structure had been detected to be attracting more network attacks than before.
Wireless networks are a revolutionary progression in the world of technology that would
be under constant upgrading. This latest implementation in the networking era would be able to
reduce costs at a huge level since the technology has eradicated the use of cables, enabling
mobility and agility in networking. However, since the inception of this revolution in the world
of wireless networking, there would be immense usability of the services offered. Particularly,
unlike wired networks, where bandwidth resource abstraction and isolation can be done on
hardware, the wireless networks do not have a straightforward isolation structure. Instead, due to
its inherent broadcasting nature, stochastic virtualization problems happen over the networking.
The most popular is the mobility factor that the wireless networking offers. Since, this
network also enables the virtualization of networks and the sharing of infrastructure, there might
be a possibility about the security feature that the technology has to offer. There can be a
possibility that due to a shared facility available in the networking system, security takes a
backseat in the structure. Wireless features are not found to be inherently secured. Despite the
potential vision that wireless structure has, the research needs to address the challenges that
remains regarding the widespread deployment of wireless services. The research thus is
conducted over a series of primary as well as secondary data that would be collected over a
dedicated time span, that decides how secure the wireless network services are. Since there have
been incidences that the wireless network structure would be breached upon by malicious users,
it needs to be identified whether the latest implementation in the technological world has any
added credibility over the security issues that the wired services have or the situation about
security is further worse.
Document Page
9
WIRELESS NETWORK SECURITY
3. Research methodology
The research conducted for checking the security issues regarding the wireless
networking would be done by adopting two methodologies. Amongst them, one should be the
primary data collection and the other would be the secondary data collection. The detailed data
collection methods would be described as follows:
Primary Data Collection Method: As far as the primary data collection method is
concerned, the data collected in this method would be done by the means of qualitative and
quantitative methods and all the data are self collected. This is to ensure that the data that is
collected is absolutely raw and unique. Therefore, all the data that are collected belongs solely to
this research and does not belong to any other research or anybody else has access to it. There
are many methodologies that are adopted for conducting the primary data and these are done by
the following ways:
Conducting questionnaires
Conducting interviews
Conducting focus group interviews
Observation of research methodologies
Case study observations
Conducting scientific experiments
Secondary data collection method: Secondary data collection method is also a type of
collection of quantitative data that should be done in this research to collect data that has also
been collected by someone else for some different purpose other than this research topic. This
method would use the following data collecting methodologies:
Document Page
10
WIRELESS NETWORK SECURITY
Simple referencing of the original data, with evidence supported for the argument.
Some data can also be edited with basic questions being asked about the subject under
research, in this case, about the vulnerabilities that the wireless networking holds.
4. Evaluation methodology
The data analysis being driven will include evaluation of all the data collected during the
research and relative findings were linked at a single platform in manner to present a specific
result that is efficient and effective for the readers. The secondary data analysis will be delivered
for the development of a platform that will support the ongoing research and it will be also
helpful in developing the scope and objective for the sectors those have been untouched for now.
The secondary data analysis will result in the identification of the sectors those will contribute in
the further research and major focus will be made on those certain topics only. The scholar
articles in addition to the collected articles will be collected for further proceeding with the
research and thus, the knowledge contribution of different respectable writers will be embedded
within the new research for better clarification on the topic. The data collected by those writers
will contribute in better findings as most of the research gaps will be filled by further attempts of
the research. Thus, the secondary data analysis will assure that the research being driven will be
helpful in implementing the innovation within the research and reaching at a result that will be a
new section. In addition to the secondary data analysis, primary data analysis will be driven in
manner to be more specific and efficient towards the findings and assuring that the driven
direction of the research is on the correct path. The data collected through the interview and
questionnaire sessions will be collected and analyzed to reach at an exact and specific result.
The secondary data analysis ad primary data analysis will be used for the evaluation of
the findings through analyzing all the data and information collected through these methods.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
11
WIRELESS NETWORK SECURITY
Thus, the collected data will provide the quantitative and qualitative result or findings in relation
to the respective topic. Identifying the quantitative value will be more specific than the
secondary data analysis and hence, it will be applied to the collected data and information and
thus, it will result in proposing a specific result related to the topics.
5. Schedule and publishing
The research will need proper planning and management in manner to assure that the
entire research has been accomplished in an efficient and effective manner. The proper planning
is always necessary for the successful accomplishment of the research and to follow a path that
can lead to certain specific and accurate findings. Following table describes the list of the
activities those need to be accomplished in a sequential manner in manner to allow the research
to be proceed in right path and deliver all the necessary activities those could lead the research
towards success. There are three major phases in this entire research that include planning,
execution, and closure in addition to various sub activities embedded within these activities.
These enlisted activities while planning to deliver the research will be helpful in assuring that the
research reaches to the final phase. The research will be closed after the submission of the
research. In manner to keep the realistic research, the listed activities will be accomplished as it
is and thus, the entire research will be effectively delivered to certain conclusion.
WBS Task Name Duration Start Finish
1 Schedule and Publishing 91 days Tue 5/8/18 Tue 9/11/18
1.1 Phase 1: Planning 37 days Tue 5/8/18 Wed 6/27/18
1.1.1 Identification of the Topics 7 days Tue 5/8/18 Wed 5/16/18
1.1.2 Selection of the Topic 5 days Thu 5/17/18 Wed 5/23/18
1.1.3 Approval for the Topic 8 days Thu 5/24/18 Mon 6/4/18
1.1.4 Collecting literatures and resources 6 days Tue 6/5/18 Tue 6/12/18
Document Page
12
WIRELESS NETWORK SECURITY
from the library
1.1.5 Sorting out the relevant topics 5 days Wed 6/13/18 Tue 6/19/18
1.1.6 sorting papers done on primary
research 6 days Wed 6/20/18 Wed 6/27/18
1.2 Phase 2: Execution 28 days Thu 6/28/18 Mon 8/6/18
1.2.1 Preparation of notes and valuable
points 5 days Thu 6/28/18 Wed 7/4/18
1.2.2 Taking notes of the findings and
results 5 days Thu 7/5/18 Wed 7/11/18
1.2.3 Start writing the report 5 days Thu 7/12/18 Wed 7/18/18
1.2.4 Research purpose identified and
written 4 days Thu 7/19/18 Tue 7/24/18
1.2.5 Secondary data analysis selected as
the methodology 4 days Wed 7/25/18 Mon 7/30/18
1.2.6 Final proposal ready 5 days Tue 7/31/18 Mon 8/6/18
1.3 Phase 3: closure 26 days Tue 8/7/18 Tue 9/11/18
1.3.1 Proofread the file 5 days Tue 8/7/18 Mon 8/13/18
1.3.2 Grammar check 7 days Tue 8/14/18 Wed 8/22/18
1.3.3 spelling check 6 days Thu 8/23/18 Thu 8/30/18
1.3.4 evaluated by professor 5 days Fri 8/31/18 Thu 9/6/18
1.3.5 Submitted to the University 3 days Fri 9/7/18 Tue 9/11/18
Document Page
13
WIRELESS NETWORK SECURITY
Figure 1: Gantt Chart
(Source: Created by Author)
6. Professional, legal and ethical issues
It is to be kept in mind that the process by which a research is conducted should be
abiding all the legal and ethical aspects of professionalism. Mostly, ethics is cited to be a
distinguishing factor between right and wrong. However, it can be found that the choices by
which a person decides to be morally correct are actually ethical. The ethical policies for
conducting a research are not discriminatory between different professions or organizations but it

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
14
WIRELESS NETWORK SECURITY
has a unified approach that addresses equally to all the organizations and professions who have
adopted to abide by the specific codes and rules to maintain legal and professional ethics for
researching on any topic.
During the research that would be conducted on the security issues about the wireless
networking technology, the professional and legal ethics that would be maintained can be
summarized as the following:
Honesty: All the scientific communications that have been conducted so far in the
research, abide by the legal and professional ethics of research. The report data, the methods and
the procedures, and status publications, all have been conducted without any dishonesty in
question. The people that have been associated in the research have been not kept under any garb
of deception and have been informed about every step taken in the research throughout. In
addition, there were no fabrications of data, or falsification or misinterpretation of data.
Objectivity: The experimental design have been completely unbiased with the addition
of analysis of data, interpretation of data, peer review, experiment testimony and other technical
tasks that have been the milestones of the research. Even self-deception and minimized biasness
have been completely avoided. Since, the disclosure of the financial and personal information
during the research could have been harmful, it would be avoided completely.
Integrity: Integrity would be maintained throughout the conducting of the research
works since it has respected the sincerity about the research, consistency would be maintained
and also promises have been kept according to the agreements that have been made during the
time period of the research.
Document Page
15
WIRELESS NETWORK SECURITY
Carefulness: Even the minimum amount of carelessness and negligence should be
avoided to carefully and critically examine the works that would be conducted in the research.
This helps in focusing on the work of self and the way by which a peer works on the same issue.
All the data that should be collected should never be made to miss the accurate time of
collection. Furthermore, the research work should be more open to the approaches of criticism
and introduction of newer ideas from outsources.
Confidentiality and respect for intellectual property: All the papers and
communications submitted for the sake of the research on the grant of publication should
maintain utmost confidentiality. In addition to that, the previous researches that have been
conducted on the same topic can be taken as a reference; however, it should not be plagiarized in
any terms. The use of unpublished methodologies or data or results should be completely
avoided to use without prior permission. Proper acknowledgement should be provided to the
contributors of the research as well.
Document Page
16
WIRELESS NETWORK SECURITY
Bibliography
Al-Janabi, S., Al-Shourbaji, I., Shojafar, M. and Shamshirband, S. 2017, “Survey of main
challenges (security and privacy) in wireless body area networks for healthcare
applications”, Egyptian Informatics Journal, 18(2), pp.113-122.
Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H. and Qureshi, K.N. 2014, “Security
issues and attacks in wireless sensor network”, World Applied Sciences Journal, 30(10),
pp.1224-1227.
Biswas, S., Bicket, J., Wong, E., Musaloiu-e, R., Bhartia, A. and Aguayo, D. 2015, August.
“Large-scale measurements of wireless network behavior”, In ACM SIGCOMM Computer
Communication Review (Vol. 45, No. 4, pp. 153-165). ACM.
Chorppath, A.K., Alpcan, T. and Boche, H. 2016, “Bayesian mechanisms and detection methods
for wireless network with malicious users”, IEEE Transactions on Mobile Computing, 15(10),
pp.2452-2465.
Ermakov, S.A., Zavorykin, A.S., Kolenbet, N.S., Ostapenko, A.G. and Kalashnikov, A.O. 2014,
“Optimization of expert methods used to analyze information security risk in modern wireless
networks", Life Science Journal, 11(10), p.511.
Fragouli, C., Prabhakaran, V.M., Czap, L. and Diggavi, S.N. 2015, “Wireless Network Security:
Building on Erasures”, Proceedings of the IEEE, 103(10), pp.1826-1840.
He, D., Zeadally, S., Kumar, N. and Lee, J.H. 2017, “Anonymous authentication for wireless
body area networks with provable security”, IEEE Systems Journal, 11(4), pp.2590-2601.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
17
WIRELESS NETWORK SECURITY
Holland, G.D., Howard, M.D., Lu, T.C., El Defrawy, K., Keegan, M.S. and Ni, K.Y., HRL
Laboratories, LLC, 2018, System and method for determining reliability of nodes in mobile
wireless network”.
Hu, R.Q. and Qian, Y. 2014, “An energy efficient and spectrum efficient wireless heterogeneous
network framework for 5G systems”, IEEE Communications Magazine, 52(5), pp.94-101.
Liang, C. and Yu, F.R. 2015, “Wireless network virtualization: A survey, some research issues
and challenges”, IEEE Communications Surveys & Tutorials, 17(1), pp.358-380.
Liu, Y., Chen, H.H. and Wang, L. 2017, “Physical layer security for next generation wireless
networks: Theories, technologies, and challenges”, IEEE Communications Surveys &
Tutorials, 19(1), pp.347-376.
Loo, J., Mauri, J.L. and Ortiz, J.H. eds. 2016, Mobile ad hoc networks: current status and
future trends”, CRC Press.
Mehani, O. 2015, October. “Network-level security and privacy control for smart-home IoT
devices”, In Wireless and Mobile Computing, Networking and Communications (WiMob), 2015
IEEE 11th International Conference on (pp. 163-167). IEEE.
Mehra, A. 2018, “To enhance the security and improve the performance of AODY protocol in
MANET using delay per hop technique”, Global Journal of Computers & Technology, 6(2),
pp.354-365.
Mukherjee, A., Fakoorian, S.A.A., Huang, J. and Swindlehurst, A.L. 2014, “Principles of
physical layer security in multiuser wireless networks: A survey”, IEEE Communications
Surveys & Tutorials, 16(3), pp.1550-1573.
Document Page
18
WIRELESS NETWORK SECURITY
Pathan, A.S.K. ed. 2016, Security of self-organizing networks: MANET, WSN, WMN, VANET”,
CRC press.
Rodríguez, L.J., Tran, N.H., Duong, T.Q., Le-Ngoc, T., Elkashlan, M. and Shetty, S. 2015,
“Physical layer security in wireless cooperative relay networks: State of the art and
beyond”, IEEE Communications Magazine, 53(12), pp.32-39.
Stallings, W. 2017, Cryptography and network security: principles and practice (p. 743). Upper
Saddle River, NJ: Pearson.”
Viani, F., Robol, F., Giarola, E., Rocca, P., Oliveri, G. and Massa, A. 2015, May, “Passive
imaging strategies for real-time wireless localization of non-cooperative targets in security
applications”, In Antennas and Propagation (EuCAP), 2015 9th European Conference on (pp. 1-
4). IEEE.
Xiao, Y. ed. 2016, Security in sensor networks”, CRC Press.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J. and Di Renzo, M. 2015, “Safeguarding
5G wireless communication networks using physical layer security”, IEEE Communications
Magazine, 53(4), pp.20-27.
Yi, S., Qin, Z. and Li, Q. 2015, August, “Security and privacy issues of fog computing: A
survey”, In International Conference on Wireless Algorithms, Systems, and Applications (pp.
685-695). Springer, Cham.
Zou, Y., Zhu, J., Wang, X. and Hanzo, L. 2016, “A survey on wireless security: Technical
challenges, recent advances, and future trends”, Proceedings of the IEEE, 104(9), pp.1727-1765.
Document Page
19
WIRELESS NETWORK SECURITY
Zou, Y., Zhu, J., Wang, X. and Leung, V.C. 2015, “Improving physical-layer security in wireless
communications using diversity techniques”, IEEE Network, 29(1), pp.42-48.
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]