Wireless Network Security: Paper Analysis and Comparison Report
VerifiedAdded on 2022/11/25
|8
|2173
|499
Report
AI Summary
This report provides an in-depth analysis of two research papers focused on wireless network security. The report begins with an introduction to the topic, highlighting the importance of security in wireless networks. It then introduces the selected papers, "Security Issues in Wireless Sensor Networks: Attacks and Countermeasures" and "Security Issues and Attacks in Wireless Sensor Network," summarizing their key findings and objectives. The report delves into the methodologies employed in each paper, comparing their research designs, data collection methods, and analytical approaches. A detailed comparison of the results from both papers is presented, followed by a critical evaluation of their advantages and disadvantages. The report also suggests potential improvements and future research directions for each paper, including the need for more comprehensive literature reviews and the exploration of prevention techniques. The report concludes with a summary of the key findings and recommendations for users to enhance their wireless network security.

WIRELESS NETWORK AND COMMUNICATION 0
Wireless network security
Wireless network security
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

WIRELESS NETWORKS AND COMMUNICATION 1
Table of Contents
Introduction................................................................................................................................2
Introduction of the papers..........................................................................................................2
Article 1: Security Issues in Wireless Sensor Networks: Attacks and Countermeasures......2
Article 2: Security Issues and Attacks in Wireless Sensor Network......................................3
Description of the methodologies..............................................................................................3
Article 1:.................................................................................................................................3
Article 2:.................................................................................................................................4
Comparison of the results...........................................................................................................4
Advantages and disadvantages of the papers.............................................................................5
For article 1:...........................................................................................................................5
For article 2:...........................................................................................................................5
Future direction..........................................................................................................................6
Conclusion..................................................................................................................................6
References..................................................................................................................................7
Table of Contents
Introduction................................................................................................................................2
Introduction of the papers..........................................................................................................2
Article 1: Security Issues in Wireless Sensor Networks: Attacks and Countermeasures......2
Article 2: Security Issues and Attacks in Wireless Sensor Network......................................3
Description of the methodologies..............................................................................................3
Article 1:.................................................................................................................................3
Article 2:.................................................................................................................................4
Comparison of the results...........................................................................................................4
Advantages and disadvantages of the papers.............................................................................5
For article 1:...........................................................................................................................5
For article 2:...........................................................................................................................5
Future direction..........................................................................................................................6
Conclusion..................................................................................................................................6
References..................................................................................................................................7

WIRELESS NETWORKS AND COMMUNICATION 2
Introduction
Wireless networks are the advanced version of wired networks that provide a platform for
exchanging information from one location to another. Mainly, wireless networks are used in
the companies for improving the performance of communication but it is also associated with
the security risk and threats. The purpose of this study is to analyse the security risks and
threats faced by consumers while using wireless networks. For a better understanding of the
research topic, two journal papers will be discussed which are based on the wireless networks
issues. The title of the first article is "Security Issues in Wireless Sensor Networks: Attacks
and Countermeasures” and second is “Security Issues and Attacks in Wireless Sensor
Network”. There are various sections will be included in this research such as the
introduction of the papers, research methodologies, comparison of results and advantages and
disadvantages of the papers.
Introduction of the papers
Article 1: Security Issues in Wireless Sensor Networks: Attacks and Countermeasures
This journal paper was written by Kahina in the year 2015 and it is based on the wireless
sensor networks. According to the author, wireless sensor networks are a very common topic
for the research and there are numbers of researchers provided their views on this topic [4].
The objective of this research is to describe security issues occurred in the wireless sensor
networks. Wireless networks have the potential for improving the performance of
communication and exchange information in an effective manner.
It is identified that the wireless sensors are very advanced which can be used for
communication purpose over a long distance and they use internet connection for connecting
two or more devices with each other [1]. There are various kinds of challenges highlighted by
the author that includes very limited resources, unreliable communication, unattended
operations, data breach, data confidentiality issue, and other security risks. In this journal
paper, the author provided an in-depth analysis of challenges and security risks faced by
wireless networks and critically reviewed the basic security scheme in wireless networks [3].
Article 2: Security Issues and Attacks in Wireless Sensor Network
This journal paper was written by Raja, Majid and Anzida in the year 2014 and the aim of
this article is to evaluate the concept of wireless sensor networks and examine the security
Introduction
Wireless networks are the advanced version of wired networks that provide a platform for
exchanging information from one location to another. Mainly, wireless networks are used in
the companies for improving the performance of communication but it is also associated with
the security risk and threats. The purpose of this study is to analyse the security risks and
threats faced by consumers while using wireless networks. For a better understanding of the
research topic, two journal papers will be discussed which are based on the wireless networks
issues. The title of the first article is "Security Issues in Wireless Sensor Networks: Attacks
and Countermeasures” and second is “Security Issues and Attacks in Wireless Sensor
Network”. There are various sections will be included in this research such as the
introduction of the papers, research methodologies, comparison of results and advantages and
disadvantages of the papers.
Introduction of the papers
Article 1: Security Issues in Wireless Sensor Networks: Attacks and Countermeasures
This journal paper was written by Kahina in the year 2015 and it is based on the wireless
sensor networks. According to the author, wireless sensor networks are a very common topic
for the research and there are numbers of researchers provided their views on this topic [4].
The objective of this research is to describe security issues occurred in the wireless sensor
networks. Wireless networks have the potential for improving the performance of
communication and exchange information in an effective manner.
It is identified that the wireless sensors are very advanced which can be used for
communication purpose over a long distance and they use internet connection for connecting
two or more devices with each other [1]. There are various kinds of challenges highlighted by
the author that includes very limited resources, unreliable communication, unattended
operations, data breach, data confidentiality issue, and other security risks. In this journal
paper, the author provided an in-depth analysis of challenges and security risks faced by
wireless networks and critically reviewed the basic security scheme in wireless networks [3].
Article 2: Security Issues and Attacks in Wireless Sensor Network
This journal paper was written by Raja, Majid and Anzida in the year 2014 and the aim of
this article is to evaluate the concept of wireless sensor networks and examine the security
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

WIRELESS NETWORKS AND COMMUNICATION 3
threats or attacks occurred in WSNs [2]. The authors identified that wireless network is an
advanced computer technology which is growing rapidly and many companies are using this
technology for improving the performance of computer networks. From this paper, it is
analysed that the wireless sensor networks are beneficial in various sectors such as health
monitoring, military, business industries, environmental control and so on [5].
The main focus of this paper is on security threats linked with the wireless sensor networks
and the authors evaluate the well-known methods of security detection against physical
attacks. According to this journal paper, the wireless sensor network is based on the dense
deployment of disposable low energy and low-cost nodes for obtaining real-time information
[6]. There are major three components of wireless networks such as sensing, processing, and
communication. The authors identified that there are several security issues occurred in WSN
for example, availability, confidentiality, unauthentic networks, signal jamming attack,
capturing the attack and so on.
Description of the methodologies
Article 1:
The first research paper is based on the theoretical framework where the author provided only
theoretical aspects of wireless networks and security issues. There are various kinds of
research methodologies used by the authors while conducting the research such as qualitative
research design, data collection method, data analysis methods and research strategy [7]. By
using such kind of methods the researcher improved the effectiveness of the obtained data
and also identified the risks factors which impact on the security of wireless networks.
In this journal paper, the author first described the idea behind wireless sensor networks and
then identified the challenges faced by users while using wireless networks. In order to
improve the quality of the research, the author adopted a secondary type of data collection
methodology that provided only theoretical information about wireless sensor networks.
Moreover, the researchers also used the views of other authors and analysed the results of
previous studies [8]. By using such kind of methodologies the authors maintained the quality
of the research and obtained the appropriate data about security issues in wireless sensor
networks. However, the author also designed and implemented a security attack framework
which clearly described the different types of security attacks faced by wireless sensor
networks.
threats or attacks occurred in WSNs [2]. The authors identified that wireless network is an
advanced computer technology which is growing rapidly and many companies are using this
technology for improving the performance of computer networks. From this paper, it is
analysed that the wireless sensor networks are beneficial in various sectors such as health
monitoring, military, business industries, environmental control and so on [5].
The main focus of this paper is on security threats linked with the wireless sensor networks
and the authors evaluate the well-known methods of security detection against physical
attacks. According to this journal paper, the wireless sensor network is based on the dense
deployment of disposable low energy and low-cost nodes for obtaining real-time information
[6]. There are major three components of wireless networks such as sensing, processing, and
communication. The authors identified that there are several security issues occurred in WSN
for example, availability, confidentiality, unauthentic networks, signal jamming attack,
capturing the attack and so on.
Description of the methodologies
Article 1:
The first research paper is based on the theoretical framework where the author provided only
theoretical aspects of wireless networks and security issues. There are various kinds of
research methodologies used by the authors while conducting the research such as qualitative
research design, data collection method, data analysis methods and research strategy [7]. By
using such kind of methods the researcher improved the effectiveness of the obtained data
and also identified the risks factors which impact on the security of wireless networks.
In this journal paper, the author first described the idea behind wireless sensor networks and
then identified the challenges faced by users while using wireless networks. In order to
improve the quality of the research, the author adopted a secondary type of data collection
methodology that provided only theoretical information about wireless sensor networks.
Moreover, the researchers also used the views of other authors and analysed the results of
previous studies [8]. By using such kind of methodologies the authors maintained the quality
of the research and obtained the appropriate data about security issues in wireless sensor
networks. However, the author also designed and implemented a security attack framework
which clearly described the different types of security attacks faced by wireless sensor
networks.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

WIRELESS NETWORKS AND COMMUNICATION 4
Article 2:
After analysing the second journal paper it is identified that the authors also used a theoretical
framework and discussed the security concern faced by wireless sensor networks. In order to
improve the performance of research, the authors used several kinds of methodologies, for
example, qualitative design, research approach, secondary data collection technique, and
content analysis method. Mainly, the qualitative research design helped the authors for
developing hypothesis and aims of the research [9]. The research approach provided a way to
the authors for developing an outline of the investigation.
The authors used secondary data collection method that has the ability to provide the relevant
facts and information about wireless sensor networks and managed the issues faced by the
authors while producing research. A literature review has been conducted by the authors for
analysing the opinions of other authors and included other journal articles. It is observed that
the authors used descriptive content analysis method which is very appropriate for the
research because it provides the meaning of full data and information about the research
topic. However, using such kind of data analysis technique the authors critically analysed the
obtained data and achieved aims and objectives of the research.
Comparison of the results
The first journal paper argued that wireless sensor networks are very common networks used
in the computer devices and it does not require any connecting wires. But as compared with
the first article the second paper identified that security is a big challenge for wireless sensor
networks which can impact on the personal data of consumers. The first research papers show
that less information about wireless sensor networks but the second paper provided in-depth
analysis of wireless sensor networks. In the first article the author found that lack of security
is a very common problem which increases the rate of security attacks in the field of wireless
sensor networks but the authors of article second found that use of unauthentic servers and
networks create a problem in the wireless networks and increase the rate of cyber-crimes due
to which users may suffer from the data breach related issues.
As compared with the second article the first journal paper provided complete information
about wireless sensor networks and developed a framework for better understanding about
security attack [4]. The first article also suggested the prevention techniques regarding
wireless networks issues and the second article did not provide any information about
Article 2:
After analysing the second journal paper it is identified that the authors also used a theoretical
framework and discussed the security concern faced by wireless sensor networks. In order to
improve the performance of research, the authors used several kinds of methodologies, for
example, qualitative design, research approach, secondary data collection technique, and
content analysis method. Mainly, the qualitative research design helped the authors for
developing hypothesis and aims of the research [9]. The research approach provided a way to
the authors for developing an outline of the investigation.
The authors used secondary data collection method that has the ability to provide the relevant
facts and information about wireless sensor networks and managed the issues faced by the
authors while producing research. A literature review has been conducted by the authors for
analysing the opinions of other authors and included other journal articles. It is observed that
the authors used descriptive content analysis method which is very appropriate for the
research because it provides the meaning of full data and information about the research
topic. However, using such kind of data analysis technique the authors critically analysed the
obtained data and achieved aims and objectives of the research.
Comparison of the results
The first journal paper argued that wireless sensor networks are very common networks used
in the computer devices and it does not require any connecting wires. But as compared with
the first article the second paper identified that security is a big challenge for wireless sensor
networks which can impact on the personal data of consumers. The first research papers show
that less information about wireless sensor networks but the second paper provided in-depth
analysis of wireless sensor networks. In the first article the author found that lack of security
is a very common problem which increases the rate of security attacks in the field of wireless
sensor networks but the authors of article second found that use of unauthentic servers and
networks create a problem in the wireless networks and increase the rate of cyber-crimes due
to which users may suffer from the data breach related issues.
As compared with the second article the first journal paper provided complete information
about wireless sensor networks and developed a framework for better understanding about
security attack [4]. The first article also suggested the prevention techniques regarding
wireless networks issues and the second article did not provide any information about

WIRELESS NETWORKS AND COMMUNICATION 5
prevention techniques which create a research gap between information and research topic
[2].
Advantages and disadvantages of the papers
For article 1:
After analysing the journal paper it is identified that the author critically reviewed the
security risks and threats linked with the wireless sensor networks. There are numerous
advantages of this paper such as provided complete information about the research topic,
used proper process while conducting the research, reduced the research gaps occurred in
previous research, identified the risk factors which impact on the wireless networks security,
and adopted the appropriate research methods.
In terms of disadvantages, the author provided less information about prevention techniques
which create a gap between the students and research topic and did not conduct any literature
review that affects the quality of the research.
For article 2:
In these research papers, the researchers described the fundamental principle of wireless
sensor networks. There are few advantages of this research study, for example provided
theoretical aspects of wireless sensor networks, identified the security risks and attacks
occurred in wireless networks and briefly described them, and adopted the effective research
methods that helped them for achieving aims and objectives of the research.
There are major two disadvantages of this paper such as did not explain any prevention
technique for security threats and provided only theoretical information about wireless sensor
networks and security issues that create a gap between the information and research title.
Future direction
In the future, both journal papers should focus on their limitations and drawbacks and
conduct a literature review for understanding the opinions of other researchers. Moreover,
authors will describe and review the prevention techniques for reducing security risk in WSN
networks which will help the students for protecting their data from hackers.
prevention techniques which create a research gap between information and research topic
[2].
Advantages and disadvantages of the papers
For article 1:
After analysing the journal paper it is identified that the author critically reviewed the
security risks and threats linked with the wireless sensor networks. There are numerous
advantages of this paper such as provided complete information about the research topic,
used proper process while conducting the research, reduced the research gaps occurred in
previous research, identified the risk factors which impact on the wireless networks security,
and adopted the appropriate research methods.
In terms of disadvantages, the author provided less information about prevention techniques
which create a gap between the students and research topic and did not conduct any literature
review that affects the quality of the research.
For article 2:
In these research papers, the researchers described the fundamental principle of wireless
sensor networks. There are few advantages of this research study, for example provided
theoretical aspects of wireless sensor networks, identified the security risks and attacks
occurred in wireless networks and briefly described them, and adopted the effective research
methods that helped them for achieving aims and objectives of the research.
There are major two disadvantages of this paper such as did not explain any prevention
technique for security threats and provided only theoretical information about wireless sensor
networks and security issues that create a gap between the information and research title.
Future direction
In the future, both journal papers should focus on their limitations and drawbacks and
conduct a literature review for understanding the opinions of other researchers. Moreover,
authors will describe and review the prevention techniques for reducing security risk in WSN
networks which will help the students for protecting their data from hackers.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

WIRELESS NETWORKS AND COMMUNICATION 6
Conclusion
After analysing the results of both journal papers, it is concluded that security is a serious
problem in wireless sensor networks which increase when consumers use unwanted links and
unauthorized servers. This report reviewed two research papers based on the security risks
occurred in wireless networks and compared the results of both research papers. Therefore, it
is recommended that users should use only authentic networks and adopt firewall and
encryption techniques while transfer or receiving data from others.
Conclusion
After analysing the results of both journal papers, it is concluded that security is a serious
problem in wireless sensor networks which increase when consumers use unwanted links and
unauthorized servers. This report reviewed two research papers based on the security risks
occurred in wireless networks and compared the results of both research papers. Therefore, it
is recommended that users should use only authentic networks and adopt firewall and
encryption techniques while transfer or receiving data from others.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

WIRELESS NETWORKS AND COMMUNICATION 7
References
[1]. M., Al Ameen, J. Liu and, K., Kwak, “Security and privacy issues in wireless sensor
networks for healthcare applications,” Journal of medical systems, vol. 36, no. 1,
pp.93-101, 2012.
[2]. R.W., Anwar, M., Bakhtiari, A., Zainal, A.H. Abdullah and, K.N., Qureshi, “Security
issues and attacks in wireless sensor network,” World Applied Sciences Journal, vol.
30, no. 10, pp.1224-1227, 2014.
[3]. A., Araujo, J., Blesa, E. Romero and, D., Villanueva, “Security in cognitive wireless
sensor networks. Challenges and open problems,” EURASIP Journal on Wireless
Communications and Networking, vol. 2012, no. 1, p.48, 2012.
[4]. K., Chelli, “Security issues in wireless sensor networks: Attacks and
countermeasures,” In Proceedings of the World Congress on Engineering, Vol. 1, No.
20, pp. 16-18, 2015.
[5]. M.P., Đurišić, Z., Tafa, G. Dimić and, V., Milutinović, “A survey of military
applications of wireless sensor networks,” In 2012 Mediterranean conference on
embedded computing (MECO), vol. 12, no. 7, pp. 196-199, 2012.
[6]. E.P.K., Gilbert, B. Kaliaperumal and, E.B., Rajsingh, “Research Issues in Wireless
Sensor network applications: A Survey,” International Journal of information and
electronics engineering, vol. 2, no. 5, p.702, 2012.
[7]. K., Islam, W. Shen and, X., Wang, “Wireless sensor network reliability and security
in factory automation: A survey,” IEEE Transactions on Systems, Man, and
Cybernetics, Part C (Applications and Reviews), vol. 42, no. 6, pp.1243-1256, 2012.
[8]. P. Kumar and, H.J., Lee, “Security issues in healthcare applications using wireless
medical sensor networks: A survey,” sensors, vol. 12, no. 1, pp.55-91, 2012.
[9]. S. Prasanna and, S., Rao, “An overview of wireless sensor networks applications and
security,” International Journal of Soft Computing and Engineering (IJSCE), ISSN,
vol. 12, no. 7, pp.2231-2307, 2012.
References
[1]. M., Al Ameen, J. Liu and, K., Kwak, “Security and privacy issues in wireless sensor
networks for healthcare applications,” Journal of medical systems, vol. 36, no. 1,
pp.93-101, 2012.
[2]. R.W., Anwar, M., Bakhtiari, A., Zainal, A.H. Abdullah and, K.N., Qureshi, “Security
issues and attacks in wireless sensor network,” World Applied Sciences Journal, vol.
30, no. 10, pp.1224-1227, 2014.
[3]. A., Araujo, J., Blesa, E. Romero and, D., Villanueva, “Security in cognitive wireless
sensor networks. Challenges and open problems,” EURASIP Journal on Wireless
Communications and Networking, vol. 2012, no. 1, p.48, 2012.
[4]. K., Chelli, “Security issues in wireless sensor networks: Attacks and
countermeasures,” In Proceedings of the World Congress on Engineering, Vol. 1, No.
20, pp. 16-18, 2015.
[5]. M.P., Đurišić, Z., Tafa, G. Dimić and, V., Milutinović, “A survey of military
applications of wireless sensor networks,” In 2012 Mediterranean conference on
embedded computing (MECO), vol. 12, no. 7, pp. 196-199, 2012.
[6]. E.P.K., Gilbert, B. Kaliaperumal and, E.B., Rajsingh, “Research Issues in Wireless
Sensor network applications: A Survey,” International Journal of information and
electronics engineering, vol. 2, no. 5, p.702, 2012.
[7]. K., Islam, W. Shen and, X., Wang, “Wireless sensor network reliability and security
in factory automation: A survey,” IEEE Transactions on Systems, Man, and
Cybernetics, Part C (Applications and Reviews), vol. 42, no. 6, pp.1243-1256, 2012.
[8]. P. Kumar and, H.J., Lee, “Security issues in healthcare applications using wireless
medical sensor networks: A survey,” sensors, vol. 12, no. 1, pp.55-91, 2012.
[9]. S. Prasanna and, S., Rao, “An overview of wireless sensor networks applications and
security,” International Journal of Soft Computing and Engineering (IJSCE), ISSN,
vol. 12, no. 7, pp.2231-2307, 2012.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





