Wireless Network Technologies: Security Issues and Solutions Report
VerifiedAdded on 2021/01/02
|8
|1380
|132
Report
AI Summary
This report delves into various wireless network technologies, addressing security issues and their solutions. It examines the importance of security measures, the current state of the art, and future research directions. The report highlights challenges faced by businesses in implementing and utilizing these technologies, such as confidentiality breaches, and proposes solutions like encryption, intrusion detection systems, power control, signal processing, and artificial noise techniques. It also explores the application of 5G, HetNets, and other advanced methods to enhance data privacy and network security. The conclusion emphasizes the role of wireless technologies in business expansion, while acknowledging the ongoing need for robust security protocols to mitigate risks.

WIRELESS NETWORK
TECHNOLOGIES
TECHNOLOGIES
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Executive summary
In this report different types of wireless network technologies are discussed. It is also
describes issues and problems that are being faced by companies while implementation or using
of those technologies. This report also shows about the importance of security measures in using
wireless technologies and opportunities which has evolved for business.
In this report different types of wireless network technologies are discussed. It is also
describes issues and problems that are being faced by companies while implementation or using
of those technologies. This report also shows about the importance of security measures in using
wireless technologies and opportunities which has evolved for business.

TABLE OF CONTENTS
Importance of security issue........................................................................................................1
State of the art..............................................................................................................................1
Issue addressed............................................................................................................................1
Direction of research....................................................................................................................2
Future research.............................................................................................................................2
CONCLUSION................................................................................................................................2
REFERENCES................................................................................................................................4
Importance of security issue........................................................................................................1
State of the art..............................................................................................................................1
Issue addressed............................................................................................................................1
Direction of research....................................................................................................................2
Future research.............................................................................................................................2
CONCLUSION................................................................................................................................2
REFERENCES................................................................................................................................4
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Importance of security issue
Security issues refers to challenges and threats that occur in wireless network. It affects
both user and sender to a great extent. Therefore, it is important for companies to identify and
determine different security issues so that effective measures can be taken to solve them (Liang
& Yu, 2015). The issues can lead to data loss, theft, etc. so, solving these will help in smooth
operations of business functions. Also, strong policies can be developed and followed. Another
importance is that the network can be modified and designed in new ways to reduce risk of
threats and issues. It has been identified that the major issue which is occurring in wireless
network is confidentiality. Data and information that is sent across network is been hacked and
steal. Due to this business has to suffer loss. This issue must be overcome by implementation of
encryption technique or device. It will help in identifying authorized user and sender to which
data packets are delivered. Furthermore, it is ensured that quality of service is maintained by
third party.
State of the art
Many authors have focused on use of security measures at large scale in network. It has
shown that security issues have resulted in reducing the quality and performance of network.
Due to this, people are not able to get high quality services. Thus, it is necessary to identify those
issues so that it can be overcome (Chin, Fan, & Haines, 2014). But wireless network has
provided opportunity for business to enhance their efficiency. With this communication has
become easier. Moreover, technology has reached to wide areas. Companies are able to interact
and share data and information more instantly.
But on other hand, high risk is involved in sharing of confidential data. It has enforced
business to develop strong policies and install IT architecture in their network. Besides this, data
is stored and protected in database and servers. Additionally, organizations are using third parties
to provide services to people. They act as interface through which user interreact and data
packets is delivered to destination. the main issue that occurs in security is change in
configuration of data packets. It enables business to take measures as per change. They have to
maintain and keep flow of data in one direction.
Issue addressed
The issue of confidentiality is being addressed by developing an intrusion detection
system (IDS) wireless mesh network. This will help in providing a hierarchical flow of data by
1
Security issues refers to challenges and threats that occur in wireless network. It affects
both user and sender to a great extent. Therefore, it is important for companies to identify and
determine different security issues so that effective measures can be taken to solve them (Liang
& Yu, 2015). The issues can lead to data loss, theft, etc. so, solving these will help in smooth
operations of business functions. Also, strong policies can be developed and followed. Another
importance is that the network can be modified and designed in new ways to reduce risk of
threats and issues. It has been identified that the major issue which is occurring in wireless
network is confidentiality. Data and information that is sent across network is been hacked and
steal. Due to this business has to suffer loss. This issue must be overcome by implementation of
encryption technique or device. It will help in identifying authorized user and sender to which
data packets are delivered. Furthermore, it is ensured that quality of service is maintained by
third party.
State of the art
Many authors have focused on use of security measures at large scale in network. It has
shown that security issues have resulted in reducing the quality and performance of network.
Due to this, people are not able to get high quality services. Thus, it is necessary to identify those
issues so that it can be overcome (Chin, Fan, & Haines, 2014). But wireless network has
provided opportunity for business to enhance their efficiency. With this communication has
become easier. Moreover, technology has reached to wide areas. Companies are able to interact
and share data and information more instantly.
But on other hand, high risk is involved in sharing of confidential data. It has enforced
business to develop strong policies and install IT architecture in their network. Besides this, data
is stored and protected in database and servers. Additionally, organizations are using third parties
to provide services to people. They act as interface through which user interreact and data
packets is delivered to destination. the main issue that occurs in security is change in
configuration of data packets. It enables business to take measures as per change. They have to
maintain and keep flow of data in one direction.
Issue addressed
The issue of confidentiality is being addressed by developing an intrusion detection
system (IDS) wireless mesh network. This will help in providing a hierarchical flow of data by
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

using proxy. It will act as Ad hoc network. IDS work on network by collecting significant data
and detecting the behavior with violation of security policy and signs. Usually encryption is used
to protect the confidentiality of data (Cavallari & et.al., 2014). Furthermore, security issues is
been addressed on basis of various elements as described below:-
Power control- here, the power which transmitted is controlled to ensure that observer cannot
recover it. in 5G communication D2D method is followed where user decides whether to adopt
optimal power allocation or not.
Relay – it is a process that can be used and helps sender to secure signal transmission. In 5G
network two protocols are used that are optimal and partial relay selection.
Cryptographic methods- There are many cryptographic methods which can be used for
maintaining data confidentiality (Gupta & Jha, 2015). Asymmetric and symmetric encryption
technique is commonly used. In this pubic and encryption key is used between the client server
relationship.
Signal processing- OSPR transmission is used to defend against viewer in an antenna. NOMA
technique secure performance in large network. The users adopt pair technique in case of poor
channel conditions. Simulation results shows secrecy outage probability decreases when the
radius of protected zone increases and probability can be improved by reducing the scope of
user as path loss decreases.
Artificial noise- this is also a concept that can be implemented in wireless network. Here,
artificial noise is proposed to secure transmission against an observer with single antenna in
millimeter wave systems. Then, wave is noded with ray cluster. Through it, sender has CSI
knowledge about observer. Thus, transmission depends on direction of destination and follows
path of observer.
Privacy of data can be protected by applying HetNets algorithms. It is a framework
through which physical layer is protected with certain parameters. Users access points are based
on packet success rate which gives a high quality of service (Ding & et.al., 2015). HetNets
consists a multiplayer system where there are various nodes with different features such as size,
radio, coverage, etc. the traditional HetNets was not significant as there was frequent conferral
between different cells. Also, mIPS architecture is installed with private enhancements.
2
and detecting the behavior with violation of security policy and signs. Usually encryption is used
to protect the confidentiality of data (Cavallari & et.al., 2014). Furthermore, security issues is
been addressed on basis of various elements as described below:-
Power control- here, the power which transmitted is controlled to ensure that observer cannot
recover it. in 5G communication D2D method is followed where user decides whether to adopt
optimal power allocation or not.
Relay – it is a process that can be used and helps sender to secure signal transmission. In 5G
network two protocols are used that are optimal and partial relay selection.
Cryptographic methods- There are many cryptographic methods which can be used for
maintaining data confidentiality (Gupta & Jha, 2015). Asymmetric and symmetric encryption
technique is commonly used. In this pubic and encryption key is used between the client server
relationship.
Signal processing- OSPR transmission is used to defend against viewer in an antenna. NOMA
technique secure performance in large network. The users adopt pair technique in case of poor
channel conditions. Simulation results shows secrecy outage probability decreases when the
radius of protected zone increases and probability can be improved by reducing the scope of
user as path loss decreases.
Artificial noise- this is also a concept that can be implemented in wireless network. Here,
artificial noise is proposed to secure transmission against an observer with single antenna in
millimeter wave systems. Then, wave is noded with ray cluster. Through it, sender has CSI
knowledge about observer. Thus, transmission depends on direction of destination and follows
path of observer.
Privacy of data can be protected by applying HetNets algorithms. It is a framework
through which physical layer is protected with certain parameters. Users access points are based
on packet success rate which gives a high quality of service (Ding & et.al., 2015). HetNets
consists a multiplayer system where there are various nodes with different features such as size,
radio, coverage, etc. the traditional HetNets was not significant as there was frequent conferral
between different cells. Also, mIPS architecture is installed with private enhancements.
2

Direction of research
In this research it is described that how security is applied and data is encrypted. it has
given a brief overview of tools and equipment’s which will support encryption of data. By using
information companies can implement measures in large scale network.
Future research
The research done is going in right direction. It has resulted in providing an overview of
security measures that can be used in 5G network. Moreover, the pros and cons of using those
measures and how effective they are can be discussed. Researcher have identified advance and
new encryption method in which third party will be included in network. They will work on
concept of D2D. this research can be applied by other researchers to evaluate areas where these
measures can be used by business.
CONCLUSION
From this report it is concluded that the use of wireless technologies has made it easy for
companies to communicate and expand their business in different markets. Also, through this
their efficiency has increased in various operations. Moreover, there are many challenges and
issues faced by companies in using these technologies. Thus, several measures and actions such
as Power control, Signal processing, Artificial noise, etc. are been used to solve those issues.
3
In this research it is described that how security is applied and data is encrypted. it has
given a brief overview of tools and equipment’s which will support encryption of data. By using
information companies can implement measures in large scale network.
Future research
The research done is going in right direction. It has resulted in providing an overview of
security measures that can be used in 5G network. Moreover, the pros and cons of using those
measures and how effective they are can be discussed. Researcher have identified advance and
new encryption method in which third party will be included in network. They will work on
concept of D2D. this research can be applied by other researchers to evaluate areas where these
measures can be used by business.
CONCLUSION
From this report it is concluded that the use of wireless technologies has made it easy for
companies to communicate and expand their business in different markets. Also, through this
their efficiency has increased in various operations. Moreover, there are many challenges and
issues faced by companies in using these technologies. Thus, several measures and actions such
as Power control, Signal processing, Artificial noise, etc. are been used to solve those issues.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

REFERENCES
Books and Journals:
Cavallari, R., & et.al., (2014). A survey on wireless body area networks: Technologies and
design challenges. IEEE Communications Surveys & Tutorials, 16(3), 1635-1657.
Chin, W. H., Fan, Z., & Haines, R. (2014). Emerging technologies and research challenges for
5G wireless networks. IEEE Wireless Communications, 21(2), 106-112.
Ding, Z. & et.al., (2015). Application of smart antenna technologies in simultaneous wireless
information and power transfer. IEEE Communications Magazine, 53(4), 86-93.
Gupta, A., & Jha, R. K. (2015). A survey of 5G network: Architecture and emerging
technologies. IEEE access, 3, 1206-1232.
Liang, C., & Yu, F. R. (2015). Wireless network virtualization: A survey, some research issues
and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380.
4
Books and Journals:
Cavallari, R., & et.al., (2014). A survey on wireless body area networks: Technologies and
design challenges. IEEE Communications Surveys & Tutorials, 16(3), 1635-1657.
Chin, W. H., Fan, Z., & Haines, R. (2014). Emerging technologies and research challenges for
5G wireless networks. IEEE Wireless Communications, 21(2), 106-112.
Ding, Z. & et.al., (2015). Application of smart antenna technologies in simultaneous wireless
information and power transfer. IEEE Communications Magazine, 53(4), 86-93.
Gupta, A., & Jha, R. K. (2015). A survey of 5G network: Architecture and emerging
technologies. IEEE access, 3, 1206-1232.
Liang, C., & Yu, F. R. (2015). Wireless network virtualization: A survey, some research issues
and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





