scholarly journals Security Threats to Wireless Networks and Modern Methods of Information Security

Author(s):  
Dr.Yasser A. Seleman

Network is a technology used to connect computers and devices together. They allow people the ability to move easily and stay in touch while roaming the Internet in the coverage area. This increases efficiency by allowing data entry and access to the site. Comparing wireless networks wired networks in terms of cost, we find that wired networks are more expensive due to the cost of the network connections of electricity and running and add computers and change their positions to suit the network supply.   As a result, the use of widespread wireless networks. But there are security gaps in these networks may cause problems for users Security holes intended problem or weakness in the wireless network system may make it easier for hackers to penetrate and steal sensitive data and causing material losses to individuals and companies. Knowing security holes and contributes significantly to the wireless network is immune from attempts to infiltrate and penetration design Keywords—Protocol: Language is between computers connected via the network, in order to exchange information. If we define the language of the Protocol technology, we say that a formal description of the bodies messages and rules that must be followed on two computers to exchange those messages.

2020 ◽  
Author(s):  
Gustavo Cainelli ◽  
Max Feldman ◽  
Tiago Rodrigo Cruz ◽  
Ivan Muller ◽  
Carlos Eduardo Pereira

The use of industrial wireless networks has been growing continuously and it hasbecome an alternative to wired networks. One of the main elements of an industrial wireless network is the network manager, this component is responsible for tasks related to the network construction and maintenance. This work presents the development of a network manager compatible with the WirelessHART protocol, but also customizable, where it is possible to make modifications in order to carry out studies with this protocol. Case studies are presented where the developed tool was used for studies related to communications scheduling, adaptive channel mapping and fast data collection, thus proving the efficiency of the proposed manager.


2016 ◽  
Vol 2016 ◽  
pp. 1-14
Author(s):  
Won-Suk Kim ◽  
Sang-Hwa Chung

Management of wireless networks as well as wired networks by using software-defined networking (SDN) has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC) for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.


2017 ◽  
Author(s):  
Pathan Aiyaz Khan

Network which is not connected by any type of cable is a wireless network. The main purpose of using wireless network is that it enables users to avoid the cost of introducing cable lines in the building or making connection between different locations. These networks are highly affected by network attack. One of these attacks are black hole attacks in which malicious node claims that it has the fresh and shortest path. As MANET doesn't have any standard infrastructure and the dynamic topology that makes these networks highly susceptible to security flaws like exploiting vulnerabilities to routing protocols and transferring harmful packets in the networks. These security issues results in adverse effect on this network. Now the task is to prevent MANET from these security threats. As this paper is based on DSR protocol hence we developed a scheme called the Cooperative Bait Detection Scheme (CBDS), which directly focus on detection and prevention of malicious nodes introducing gray hole/black hole attacks in MANETs. To implement this CBDS we use back tracing method. Hence from our proposed system we won't require any special hardware or detection node to prevent against blackhole attacks.


Author(s):  
Asep Wishnu ◽  
Bambang Sugiantoro

The growing number of internet users in Indonesia, making the number of users increasing especially video streaming on Youtube service. This increase is based on rapid technological developments, especially PCs, Laptops and Smartphones that use wireless or wireless internet access. The use of streaming video over wireless networks is different from cable networks Because The characteristics of wireless networks are limited Compared to wired networks, and the characteristics of streaming video transmissions that require different handling than traditional text, and the data transmissions. As a first step towards Achieving an optimum Internet network service effort, Applies Action Research This research method by utilizing video quality with 360p, 480p, and 720p. The QOS parameters Analyzed Consist of delay, jitter, throughput, packet loss and bandwidth using wireshark and NetTools for the testing phase. The results of analysis using QoS for streaming video shows the performance of wireless network services at UIN Sunan Kalijaga, Faculty of Science and Technology is still not maximal especially on video with 480p quality, that has a 20 ms delay and jitter quality level ms According -0.0269 to TIPHON is very good. The amount of throughput is 0:55 MBps throughput and the percentage is 3% and the packet loss value is 28%, if it is Categorized by TIPHON standardization bad this value falls into the category. For the average bandwidth used is 329 714 bps value.


2020 ◽  
Author(s):  
Sun Jun Ee ◽  
Jeshua Woon Tien Ming ◽  
Jia Suan Yap ◽  
Scott Chuen Yuen Lee ◽  
Fatima tuz Zahra

In this modern day and age, wireless networks are everywhere. It is not a far stretch to say that it is downright crucial due to its ability to keep people connected and updated everywhere from universities and workplaces down to our personal homes. Though the benefits of wireless networks are undeniable, it also brings a new host of security concerns due to the amount of sensitive data being transmitted through these networks. A simple attack such as packet sniffing is enough to “sniff” out just enough data to cripple even giant corporate bodies if left unchecked. The aim of this research paper is to dissect and discuss the security and privacy issues of wireless networks that surround us. An interesting finding would be that wireless networks are heavily susceptible to both malicious attacks such as denial of service attacks and passive attacks like eavesdropping. It was also noted that information is more easily obtainable through wireless networks as compared to wired networks due to the ability to gleam information from long distances without having to be physically present on site. A literature review and a survey were conducted to learn about the opinions of casual users of wireless networks. The information gathered suggests that while there are many who care about privacy, they still lack the necessary knowledge to protect said privacy. These users carelessly connect to public wireless networks wherever it is available without proper precaution and care. Appropriate relevant solutions are presented based on literature study to overcome insecure wireless network usage practices in order to avoid active and passive attacks.


2018 ◽  
Vol 1 (1) ◽  
pp. 33
Author(s):  
MUHAMMAD FAUZI ZULKARNAEN ◽  
Moh Husni Taufik ◽  
Maemun Saleh

Access point placement on wireless networks is needed to optimize the strength of signal received by receiver from transmitter. The most influential parameter in determining the performance of access point position is signal strenght, because this value will be used to determine the coverage area of a access point. In this research, signal strengths of access point to receiver in the SMAN 1 Praya Tengah have been measured using inSSIDer application and results in the values of RSSI from transmitter to receiver. Data obtained from the filed measurements are used to analyse the influence of access point placement using simulate annealing. The research conducted is expected to generate an appropriate position and analysis for further optimization of access point position on wireless network.


10.28945/3560 ◽  
2016 ◽  
Vol 1 ◽  
pp. 001-030

The sun set on another long day at the headquarters of ReliaQuest where Brian Murphy leaned back in his chair and exhaled deeply as he considered the cyber security breaches that had consumed the media in recent weeks. Retail giants like Target, Lowe’s and Home Depot had fallen victim to serious data breaches. He pondered how his company, ReliaQuest, could make a difference in a world saturated with an invisible army of hackers. Companies had to fend off attacks 100% of the time, but the hackers only had to be successful once. As Brian contemplated the brand new Secure Operations Center (SOC) being built in his offices in downtown Tampa, he reflected on his recent pitch to a multi-billion dollar global medical device company. The company wanted all of ReliaQuest’s solutions—the Assess, Secure, and Manage options. This would be a multi-million dollar contract over several years. But the CIO and CEO had been very clear, with the contract would come a demand for a 100% guarantee that ReliaQuest solutions would prevent any information system breach and eliminate the possibility of any loss of data for their customers, suppliers, or employees. Cyber security, as Brian thought of it, was the largest and most expensive cat and mouse game in the corporate world, and often undervalued by companies until a breach occurred. How could ReliaQuest offer solutions that companies would value with or without a breach? How could Brian’s team provide alternatives to companies who frequently did not even understand the wide variety of cyber security threats? What kinds of risks to data and information security were acceptable? What was the cost/benefit analysis on a breach? What sort of role should the client company play in protecting their data and that of their customers, vendors, and employees? Was there such a thing as too much security? Certainly there could be too little security, right? Could ReliaQuest, or any cyber security company, “guarantee” zero breaches, or losses of sensitive data and information? What could ReliaQuest offer its clients when every solution promised came with the risk of a breach and loss of data?


2020 ◽  
Author(s):  
Sun Jun Ee ◽  
Jeshua Woon Tien Ming ◽  
Jia Suan Yap ◽  
Scott Chuen Yuen Lee ◽  
Fatima tuz Zahra

In this modern day and age, wireless networks are everywhere. It is not a far stretch to say that it is downright crucial due to its ability to keep people connected and updated everywhere from universities and workplaces down to our personal homes. Though the benefits of wireless networks are undeniable, it also brings a new host of security concerns due to the amount of sensitive data being transmitted through these networks. A simple attack such as packet sniffing is enough to “sniff” out just enough data to cripple even giant corporate bodies if left unchecked. The aim of this research paper is to dissect and discuss the security and privacy issues of wireless networks that surround us. An interesting finding would be that wireless networks are heavily susceptible to both malicious attacks such as denial of service attacks and passive attacks like eavesdropping. It was also noted that information is more easily obtainable through wireless networks as compared to wired networks due to the ability to gleam information from long distances without having to be physically present on site. A literature review and a survey were conducted to learn about the opinions of casual users of wireless networks. The information gathered suggests that while there are many who care about privacy, they still lack the necessary knowledge to protect said privacy. These users carelessly connect to public wireless networks wherever it is available without proper precaution and care. Appropriate relevant solutions are presented based on literature study to overcome insecure wireless network usage practices in order to avoid active and passive attacks.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


Sign in / Sign up

Export Citation Format

Share Document