Hot Topics in Information Security
Topic: Wireless Network Security and Preventive Methods
Background
The report depicts the crucial necessity of developing different security approaches, in the application field of wireless network system. Due to the adaptation of the security approaches the users will be able to keep the confidentiality of the system from the data breaches and external attackers.
As the usage of technology is increasing rapidly thus, the accessibility of wireless network system is also frequently enhancing in both workplaces and homes also. The threats and challenges associated to wireless devices are also illustrated in this report.
In addition to this, the issues that might occur while using the wireless systems are very much difficult to mitigate. In order to combat the issues different, relevant mitigation strategies are needed to be adopted by the wireless network system users.
Apart from the challenges, problems and the vague area, application of the relevant technologies and certain research questions are also elaborated in this report.
It has been found that as in most of the business organizations and for personnel usage the wireless network systems are used and in all the cases security is the most important factors that is required to be considered.
After vast analysis, it has been found that most if the system developers are using the wireless network system for different purposes in both the workplaces and home. It is determined that many typical challenges are associated to these systems such as with Wireless Local Area Network (WLAN), access points and also with service set identifier. The major challenge of the system is associated to its security (Shamshirband et al., 2014). Due to the adoption of lack of prevention measures, the wireless network systems are facing difficult security challenges. If the system developers fail to adopt the accurate security measures then the entire process will be a failure. The components of wireless network system are wireless access point, clients and users. The major challenges associated to the wireless network systems are as follows:
Accidental association: By different intent and methods the unauthorized users rather attackers can access the information stored in the data server of an organization. Among these different methods the most widely used attacking method is Accidental association method. In this process the users are not aware of the attack (Yang, 2014). Whenever, the users turn on the computer an automatic latch gets created along with the neighboring computer of another enterprise and unknowingly the information of the users et hijacked by the attack. Due to the overlapping network the attack become easier to the users and on the other the vice versa can also take place (Pantazis et al., 2013). It means that the personnel information might also get hacked. These processes become true if the laptops are found to be keen to make connection along with the wired network.
Research Requirements
Threats in the wireless security networks: the wireless sensor networks are able to develop single point breakdown, mainly for the uninterrupted rather endless sensor network architecture. Due to the presence of unattended sensor nodes the security of the wireless network system gets interrupted (Rashid & Rehmani, 2016). It has been found that, the location tracing approach that exists in the system is bounded in a particular area while tracing the wireless intruders. On the other hand, the physical ambiance monitoring process of Ad hoc wireless sensor networks are within a threatening zone.
The security models and other existing security threats: Due to the presence of incorrect security model it has been found that many performance, administrative and management issues have been encountered those are associated to wireless network. In addition to this, different securities schemes are there those are not able to guard the existing threats (Yang, 2014). Other reasons include immature security schemes of wireless security network, lack of accurate visualization approach for wireless communication, ineffective security mode for the wireless network. In addition to this, certain other security threats of the system involve inappropriate compressed real time transfer protocol, inaccurate security integration schemes and limitation issues with wireless smart home system.
Different attacks on wireless sensor networks: For developing guarantee no such common method exists in the wireless sensor network systems. It has been found that, for the existing threats the security solution those have been implemented are not at all feasible (Rohbanian et al., 2013). The wireless sensor network oriented protection mechanisms are not enough matured. In order to handle the different security threats the protocols used in both network layer and data link layer are not enough effective. In addition to this, the insufficient security measures are other reasons for the security threats.
Security attacks on the Ad hoc wireless networks: One of the most demanding areas of wireless network is the Ad Hoc network. However, most amounts of risks are also associated to the Ad Hoc Network. The communication can be easily disrupted with intruders, as they could easily access the different resources of the networks (Razzaque, Salehi & Cheraghi, 2013). Due to ineffective detection approaches of intruders in the ad hoc networks the developers fail to serve accurate cryptographic solution. The frequent attacks on the routing protocols might interrupt the reliability and performance of the system (Pantazis et al., 2013). There is no limitation and response method exists for handling the wormhole attacks in Ad hoc networks.
US Cryptography Export Restrictions: Past, Present, and Future
In order to combat the issues intrusion detection system can be used. Various attack prevention method can also be used (Rault, Bouabdallah & Challal, 2014). The fault endurance technology can also be used for mitigating the WSN issues. Periodic checkup is also needed to combat the challenges. Different types of wireless communication technologies are there those are necessary for the users to utilize securely without any kind of error (Rashid & Rehmani, 2016). Nowadays the wireless communication technologies have become an integral part of the several types of communication devices because it allows the consumers while communicating regardless of the location of the users. Even if the location is found to be in remote areas then also the access become possible. The technology relevant to the wireless networking technologies includes wireless networking (wi fi), wimax, Bluetooth technology wireless networking etc.
By increasing the real time transport protocol, there is other technological application can be used for the point to point links. Internet of things (IOT) is referred to as another relevant technology of wireless sensor system. The WLAN uses high frequency radio waves in the systems for developing protected communication between the wireless network devices (Pantazis et al., 2013. The wireless communication system has been emerged as one of the major security breaches, in the traditional wireless communication network systems. However, after the adoption of wireless network system, the issue of network messiness has been reduced frequently. Regardless of the location and time phase the users can use the system efficiently and also with the help of the system the developers can increase their overall working efficiency with a lesser amount of system error. In this sort of devices the internet can be accessed much professionally and the overall cost for the wireless network can also be reduced. Even for the maintenance and installation the cost also gets reduced a lot.
In most of the workplaces and for personnel usage also these technologies are used however in cases these are not enough effective. As the wireless network technologies are able to establish secured connection between devices thus, the government can collect information over the network (Li, Da Xu & Wang, 2013). Through the interconnection among the device the information could be efficiently transmitted from one device to the other. Security is referred to as one of the most important factors that is strictly required to be considered by the system developers. However if they fails to considered all the aspects then the entire system will be a failure.
- What are the effects of wireless sensor network in daily lives?
- For mitigating the challenges of WSN what are the necessary security measures that should be undertaken?
- How to establish a secured connection between the service providers and users?
- What are the impacts of WSN sustainability?
- Does the WSN can be operated over the internet connection?
- What are the different security aspects those are needed to be adopted by the system developers while developing the system?
Biometrics for Authentication: Security and Privacy Implications
Conclusion
From the overall discussion it can be concluded that security is one of the major concerns that is strictly required to be considered while developing system with the help of wireless sensor security network. The challenges, other problems are also mentioned in this report. In addition to this the relevant technologies that might mitigate the challenges and problem of wireless network technologies are also elaborated in this report. The appropriate application of the technologies and the vague areas are also clarified in this report. In addition to this, certain research questions are also illustrated in this report. Apart from this there are many other devices those are necessarily used by the system developers while developing the system in terms of wireless adopters, wireless repeaters, and microwave, infrared.
References
Li, S., Da Xu, L., & Wang, X. (2013). Compressed sensing signal and data acquisition in wireless sensor networks and internet of things. IEEE Transactions on Industrial Informatics, 9(4), 2177-2186.
Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications surveys & tutorials, 15(2), 551-591.
Rashid, B., & Rehmani, M. H. (2016). Applications of wireless sensor networks for urban areas: a survey. Journal of Network and Computer Applications, 60, 192-219.
Rault, T., Bouabdallah, A., & Challal, Y. (2014). Energy efficiency in wireless sensor networks: A top-down survey. Computer Networks, 67, 104-122.
Rawat, D. B., Yan, G., Bista, B. B., & Weigle, M. C. (2015). Trust On the Security of Wireless Vehicular Ad-hoc Networking. Ad Hoc & Sensor Wireless Networks, 24(3-4), 283-305.
Razzaque, M. A., Salehi, A., & Cheraghi, S. M. (2013). Security and privacy in vehicular ad-hoc networks: survey and the road ahead. In Wireless Networks and Security (pp. 107-132). Springer Berlin Heidelberg.
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98-110.
Rohbanian, M. R., Kharazmi, M. R., Keshavarz-Haddad, A., & Keshtgary, M. (2013). Watchdog-LEACH: a new method based on LEACH protocol to secure clustered wireless sensor networks. arXiv preprint arXiv:1310.3637.
Shamshirband, S., Patel, A., Anuar, N. B., Kiah, M. L. M., & Abraham, A. (2014). Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Engineering Applications of Artificial Intelligence, 32, 228-241.
Wu, J., Ota, K., Dong, M., & Li, C. (2016). A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416-424.
Yang, K. (2014). Wireless sensor networks. Principles, Design and Applications.
Zhang, D., Li, G., Zheng, K., Ming, X., & Pan, Z. H. (2014). An energy-balanced routing method based on forward-aware factor for wireless sensor networks. IEEE transactions on industrial informatics, 10(1), 766-773.