logo

Wireless Network Security: Challenges and Prevention Methods

   

Added on  2023-06-04

12 Pages2771 Words266 Views
Theoretical Computer ScienceData Science and Big Data
 | 
 | 
 | 
Security of Wireless networks
Wireless Network Security: Challenges and Prevention Methods_1

WIRELESS NETWORK SECURITY
1
Abstract
A wireless network is a part of a communication system which is used by many
organizations because it is more flexible as compared to other computer networks. This
latest technology covers a large range of capabilities oriented programmes and with the
help of wireless system users can move their computer device from one place to
another. WLAN is one of the best types of a wireless network because it provides a
platform to share information over long distance and it is more reliable communication
systems. AD-HOC network is used to interconnect two or more digital devices and it
does not require any connecting cables because it uses wireless transmitters and
receivers. The main purpose of this report is to understand security issues faced in
wireless networks and their prevention methods. For security, users can adopt
advanced networks and systems like encryption, cryptography, and IOT.
Keywords: WLAN, Ad-Hoc network, transmitter and receiver, IOT, and flexibility.
Wireless Network Security: Challenges and Prevention Methods_2

WIRELESS NETWORK SECURITY
2
Table of Contents
Abstract.................................................................................................................................................1
Introduction...........................................................................................................................................3
Overview of wireless networks security................................................................................................3
Technologies used in Wireless network security...................................................................................4
Service Set Identifier..........................................................................................................................5
Open system authentication.............................................................................................................5
Access point.......................................................................................................................................5
Ad Hoc networks...............................................................................................................................5
Challenges/issues faced in wireless networks.......................................................................................6
Parking Lot Attack..............................................................................................................................6
Shared key authentication flaw.........................................................................................................6
DOS attack.........................................................................................................................................7
Configuration conflict........................................................................................................................7
(Literature Review) Gaps in the literature.............................................................................................8
Proposed Design....................................................................................................................................8
Future scope..........................................................................................................................................8
Conclusion.............................................................................................................................................9
References...........................................................................................................................................10
Wireless Network Security: Challenges and Prevention Methods_3

WIRELESS NETWORK SECURITY
3
Introduction
Wireless technologies are very popular in terms of communication and
flexibility. The main benefit of this computer system is that it can be used for long
distance communication that means consumers can share their private data from one
location to another. The main objective of this paper is to describe different kinds of
security challenges and threats faced in wireless networks and how users can reduce
this type of issues. Wireless security is a platform where users can avoid unauthorized
servers and damage to computer systems. This report is categorized into three parts, for
example, an overview of wireless network security, challenges and issues, and the gap
in the literature.
Research problem
The main problem occurs with wireless networks is data breach and denial of
services attack. This report finds various kinds of problem and issues of wireless
network security.
Research Justification
There are many wireless networks developed in the last few years by which
users can improve the performance of their systems like WLAN, and IoT (Chen, Qian,
Mao, Tang, & Yang, 2016). The problem of security can be reduced by encryption and
firewall software and consumers can use the robust process to block unwanted traffic
signals.
Overview of wireless networks security
For any computer network security is a very important key factor and from last
few year security issues in a wireless system is increasing very fast (Al, Al, Shojafar, &
Shamshirband, 2017). It is defined as a step to improve the security of user private
information and it is also called a subset of computer security that provides protection
methods for wireless communication. Generally, security of the wireless network is
produced with the help of various computer and digital devices like routers, switched
and hubs (Díaz, Martín, & Rubio, 2016). It is estimated that if any user adopts security
plans for their networks then the hacker is not able to enter into personal servers.
Wireless Network Security: Challenges and Prevention Methods_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Network Security
|12
|3480
|114

Wireless Network Security and Preventive Techniques
|12
|3476
|20

Wireless Security Issues
|11
|2357
|56

Significance of IoT in Communication System and Importance of Big Data and Cloud Computing
|11
|3013
|282

Wireless Communication Protocols and Technologies Used in IoT
|5
|1730
|427

Paper on Wireless Networking Concepts
|15
|1083
|28