Wireless Network Security: An Abstract on Preventive Techniques

Verified

Added on  2024/05/21

|2
|348
|165
Report
AI Summary
This document provides an abstract discussing wireless network security and preventive techniques. It highlights the demand for wireless technology and the use of cryptographic techniques like encryption and authentication to provide security. Various wireless protocols, such as IEEE 802.11, cellular, and Bluetooth, are mentioned, along with security measures like policies, access control, and application security. The abstract identifies security breaches, including data modification, impersonation attacks, eavesdropping, replaying, and denial-of-service attacks, as well as internal and external threats. Countermeasures are elaborated at administrative, physical, and technical levels, emphasizing data encryption, integrity, authentication, and active protection. The research aims to explore advanced technology and the security of wireless networks in organizations.
Document Page
Wireless Network security and preventive techniques
Abstract
Wireless technology is in demand in the present market as it enables the advancement of
technology and makes the consumer feel the better experience. In the present time, various
cryptographic techniques were used to provide security such as encryption and authentication. It
will help in providing security restrictions to many of the infiltrations. There were various
protocols that have been established for the wireless technology such as IEEE 802.11, cellular,
blue tooth and so on.There are several security measures that have been added to the current
scenario of wireless technology such as policies, access control, and application security and so
on (Gopalakrishnan, 2014).
There are various security breaches that affect the protective measures of the wireless security. It
includes data modification, impersonation attacks, eavesdropping, replaying, and denial of
service and so on. Instead, of this, there are more categories of threats that belong to internal and
external agents. Countermeasures are elaborated in the form of three levels and they are
administrative level, physical level and technical level security. The security mechanism
provided in information security includes data encryption, integrity, authentication and active
protection (Al Ameen, Liu & Kwak, 2010). This topic has been selected for the research as it
enables the users to research in the field of advanced technology. Wireless technology is also
widely used in many of the organizations and its security must be studied accurately.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Al Ameen, M., Liu, J., & Kwak, K. (2010). Security and Privacy Issues in Wireless Sensor
Networks for Healthcare Applications. Journal Of Medical Systems, 36(1), 93-101.
http://dx.doi.org/10.1007/s10916-010-9449
Gopalakrishnan, S. (2014). A SURVEY OF WIRELESS NETWORK SECURITY. International
Journal Of Computer Science And Mobile Computing, 3(1), 53 68. Retrieved from
https://pdfs.semanticscholar.org/0815/10324c5208d4c4baeb414872e98eaf1bc729.pdf
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]