The report depicts the importance of implementing security in the wireless network system for protecting it from high ranged data breaches. It has been assumed that with the rapid advances in technology, the accessibility of wireless devices are also increasing frequently in both workplaces and houses. This report elaborates the threats and risk associated to wireless network system.
The challenges associated to the wireless system are very much difficult to mitigate thus relevant technologies are required to be adapted for this kind of systems those are also illustrates in this report. Different applicable technologies are there those should be used in the working and home ambiances for mitigating the security threats (Rawat et al., 2015). Apart from this, the report also elaborates certain research questions and vague areas of wireless network systems and also demonstrates the proper application of the technology
In both home and workplaces wireless networks are widely using by the system developers. Typical challenges are associated to all the wireless networks such as wireless local area network, access point, service set identifier etc. The main challenge associated to the system is the security (Chen et al., 2016). If the system lacks appropriate security measures then the entire process will be failure due to lack of accurate prevention measures (Rezvani et al., 2015). In order to establish secured communication between different digital devices, WLAN is a local area network uses high frequency radio waves in the systems. In the traditional wireless communication networks, wireless communication has emerged as a major breakthrough (Lake et al., 2014). The messiness of the network system has completely reduced after the usage of wireless network system. The challenges associated to this are as follows:
Vulnerability in wireless security network: For the back to back sensor network architecture, the wireless sensor network forms single point breakdown. The main cause for the security laps is the unattended sensor nodes (Li, et al., 2014). In order to trace the wireless intruders, there is a boundary for the existing location tracing methods. In the revised specification of IEEE 802.11i, the threats and network challenges are not yet considered. The sensor networks for monitoring approach are in the vulnerability zone.
The recent security models and customary security threats: The current wireless personal area network has an immature security schemes (He et al., 2015). The security models developed for wired networks are not at all effective for the wireless networks. For the heterogeneous network and for the smart home network the identified problems are respectively inadequate security and limitation issue.
Attacks on the wireless sensor networks: In order to develop guarantee for security in all the layers of the networks there is no common security model (Rashid & Rehmani, 2016). Against the prevalent security threats, protection mechanisms are very much weak. The security adapted for the security and network layers are very weak. Even the security measures for the overall wireless sensor network are very weak.
Attacks on Ad-hoc wireless network: In most of the cases it has been identified that the cryptographic solution for intruder detection are very weak (Butun, Morgera & Sankar, 2014). For the worm attacks there is no such response method has been developed by the network security developers.
Different types of wireless network security technologies are there those are used widely both in the workplaces and personnel uses. However, for error application in the corporate field, different security concerns have been adopted (Rashid & Rehmani, 2016). In order to improve the security features, the vendors of wireless security providers play active roles accordingly still before practical implementation all the threats are needed to be considered properly. In the adaptation process of wireless local area network, security is the major threat. Not only small but also large enterprises are facing major security threats due to lack of proper technologies (Rezvani et al., 2015). Security is the responsibility for both the buyers and for the service providers. In order to develop the security approaches, the elements of wireless security those should be implemented are as follows:
The unauthorized users are required to be discouraged through the implementation of proper authentication approaches. The rouge access points must be eliminated from the system for preventing it from unauthorized access. Even during the data transition phase the information must keep secured from the external attackers. The available wireless security solution include wi fi protected access (WPA), the Wi Fi Protected Access 2(WPA2), Virtual private networking (VPN3) (Butun, Morgera & Sankar, 2014). Proper implementation of application and network firewall and virtual private network will help the enterprises from unauthorized access.
It has been found that, with the VPN network the confidential information of one enterprise cannot be leaked and the confidentiality could be maintained well. One of an evolving security framework, for the WLAN and the interoperability issue has been identified (Razzaque, Salehi & Cheraghi, 2013). Access in wi fi increases the rate of security threat mostly. Through the wi fi connection, the attackers might attack to the security networks and access server for stealing information for misusing.
In the mobile Ad Hoc network, for finding out the intruders the cryptographic based schemes can also be failed accordingly. The Ad hoc network routing protocols are absolutely prone towards the security attacks (Jing et al., 2014). The majority of the routing protocols are concern only with the router lengths. During the deployment phase, the WSN gateway single point failure might occur. However, after the sensor nodes deployment, they might remain unattended (Butun, Morgera & Sankar,l 2014). While considering the protocol issue, it has been found that, the protocol link might get failed in both the network and data link layer of the network models.
Proper Intrusion Detection System (IDS) can be used for mitigating the issues associated to wireless network system. During the root construction phase, different kinds of attack prevention, methods can be used by the system developers (Shamshirband et al., 2014). From system analysis, it has been found that, it is necessary for the security metrics to being the integral part of the security metrics. The WSN issues can be mitigated by increasing the fault endurance of the network (Wu, Ota Dong & Li, 2016). All the nodes of the network are required to be checked periodically. In order to handle the security issues of protocol proper security architectures are required to be implemented by the system developers.
Development of cryptographic technology: In order to mitigate the network associated security threats the different cryptographic protocols are required to be developed in both the network and application layers in the network models (Rohbanian et al., 2013). It will help the system from external attackers such as DOS attack and DDOS attacks. With the help of the RADIUS authentication only the authorized users will be able access the network officially (Jing et al., 2014). The session keys will increase the security range of the system and in the Bluetooth devices, the proper PIN are required to be entered for creating the pair only with the known devices.
Enhance Compressed Real-time Transport Protocol (ECRTP) is another technological application that can be used in the wireless point to point links (Butun, Morgera & Sankar, 2014). The error rates in the bits can also be mitigated with the help of this protocol. The issues of heterogeneous wireless networks can also be mitigated with the help of the integration model network (Rezvani et al., 2015). On the other hand, there is another protocol named as OLSR which is used to keep the neighbor information secured from the external attackers.
The system is very much efficient and basically for increase the overall business effectiveness most of the business organizations and even for personnel uses people do use this applications widely (Razzaque, Salehi & Cheraghi, 2013). Though, one of the vague parts of the network system is the improper authentication.
From the overall discussion it can be concluded that in order to keep the sensitive information secured from the external attackers security is one of the major concerns that is required to be considered. The report mentioned all the security threats and challenges associated to wireless sensor network. Different research questions associated to wireless network security are also illustrated in this report. Apart from this, in order to mitigate the challenges different technologies are adapted and applied on the security threats. The proper applications of those technologies are also illustrated in this report. Apart from the challenges mitigation strategies, also the report demonstrated different relevant technologies those can be developed for combat the security related issues.
Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266-282.
Chen, M., Qian, Y., Mao, S., Tang, W., & Yang, X. (2016). Software-defined mobile networks security. Mobile Networks and Applications, 21(5), 729-743.
He, D., Chan, S., & Guizani, M. (2015). Mobile application security: malware threats and defenses. IEEE Wireless Communications, 22(1), 138-144.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Lake, D., Milito, R., Morrow, M., & Vargheese, R. (2014). Internet of things: Architectural framework for ehealth security. Journal of ICT Standardization, River Publishing, 1.
Li, W., Yi, P., Wu, Y., Pan, L., & Li, J. (2014). A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Journal of Electrical and Computer Engineering, 2014.
Rashid, B., & Rehmani, M. H. (2016). Applications of wireless sensor networks for urban areas: a survey. Journal of Network and Computer Applications, 60, 192-219.
Rawat, D. B., Yan, G., Bista, B. B., & Weigle, M. C. (2015). Trust On the Security of Wireless Vehicular Ad-hoc Networking. Ad Hoc & Sensor Wireless Networks, 24(3-4), 283-305.
Razzaque, M. A., Salehi, A., & Cheraghi, S. M. (2013). Security and privacy in vehicular ad-hoc networks: survey and the road ahead. In Wireless Networks and Security (pp. 107-132). Springer Berlin Heidelberg.
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98-110.
Rohbanian, M. R., Kharazmi, M. R., Keshavarz-Haddad, A., & Keshtgary, M. (2013). Watchdog-LEACH: a new method based on LEACH protocol to secure clustered wireless sensor networks. arXiv preprint arXiv:1310.3637.
Shamshirband, S., Patel, A., Anuar, N. B., Kiah, M. L. M., & Abraham, A. (2014). Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Engineering Applications of Artificial Intelligence, 32, 228-241.
Wu, J., Ota, K., Dong, M., & Li, C. (2016). A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416-424.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Wireless Network Security And Preventive Methods. Retrieved from https://myassignmenthelp.com/free-samples/wireless-network-security-and-preventive-methods.
"Wireless Network Security And Preventive Methods." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/wireless-network-security-and-preventive-methods.
My Assignment Help (2018) Wireless Network Security And Preventive Methods [Online]. Available from: https://myassignmenthelp.com/free-samples/wireless-network-security-and-preventive-methods
[Accessed 24 January 2021].
My Assignment Help. 'Wireless Network Security And Preventive Methods' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/wireless-network-security-and-preventive-methods> accessed 24 January 2021.
My Assignment Help. Wireless Network Security And Preventive Methods [Internet]. My Assignment Help. 2018 [cited 24 January 2021]. Available from: https://myassignmenthelp.com/free-samples/wireless-network-security-and-preventive-methods.
With time, MyAssignmenthelp.com has become one of the best college essay writing services. Our all rounded services give students the confidence to overcome assignment related issues. Our services are fast enough to meet most urgent deadlines. We are capable of delivering fast essay writing services with the help of our specially designed provisions and writers' teams. Our urgent essay help services guarantee most rapid delivery of assignment solutions. Some of our most popular essay services are application essay help, exploratory essay help, literary review essay help and argumentative essay help.
Answer Annotated Bibliography Article 1 Citation Lu, T. H., Lin, H. C., Chen, R. R., & Chen, Y. L. (2013). Motion-Sensing Based Management System for Smart Context-Awareness Rehabilitation Healthcare. Advances in Internet of Things, 3(02), 1. Summary This paper is completely based on the motion sensing based management process and in which the author explained different balance exercis...
Read MoreAnswer Reflective journal The paper will evaluate different facts regarding why the communication skills is consideredas being one of the difficult processes especially for people from different cultures. As I belong to a different country which means a different culture, language, and a different living style therefore,I have facedcommunication problems during the first year of my college in Dublin. Due to this problem, I was unable to make ...
Read MoreAnswer: Importance of the project Business management is a set of doable that must be performed before initiating the project for achieving better results. This report will discuss about issues and problems that Coca Cola faces while performing business management. This report will also discuss about the opportunities Coca Cola will enjoy during their expansion. SMART objectives of Coca Cola is also discussed in this report. SMA...
Read MoreAnswer: Introduction 3D printing refers to the process of creating 3D solid objects from digital files. The development of a 3D printed object is usually obtained by use of the additive process. In this process an object is developed by laying down successive layers of material until the object is created. All this layers can be seen as individual thinly sliced horizontal cross-section of the eventual object. How 3D printer works The proces...
Read MoreAnswer: This Assessment Booklet provides you with information and your assessment tasks for this unit. A requirement of your qualification, from which the unit of competence is taken, is the application of the concepts you have been learning.The assessment activities are an important part of your course as they provide an opportunity to apply what you have been learning and they give both you and your trainer feedback on your progress. ...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I was very satisfied with the expert\'s work. I would recommend this site for anyone having trouble with an assignment or trouble meeting a deadline.
Australia
Will use again, sometimes I have issues getting the creative part of writing going and love being able to reach out to help with drafts
Australia
The best way to paraphrase is to change every few words in the sentence or paragraph I want to use in my assignment.
Australia
good and excellent I am satisfied with your work. All the work done on time. Experts are good.
Australia