scholarly journals A SURVEY ON AUTHENTICATION TECHNIQUES FOR WIRELESS MEDIUM

2018 ◽  
Vol 6 (5) ◽  
pp. 369-376
Author(s):  
Pradeep ◽  
Manjunath

The wireless communication technology gaining importance in extreme conditions in a very effective way due to its benefits. Compared to wired networks, wireless networks have many benefits in terms of flexibility, cost, and mobility. Wireless networks can be easily hacked by the outsiders if there is no proper security. Because of its increasing popularity, wireless networks need proper security measures in addition to the normal protections such as firewalls, virus detectors, etc. Providing the required additional security to the wireless networks is a challenging task. Security can be maintained by providing data authenticity, integrity confidentiality, and authorization. A survey on the security of wireless networks is put forward that discusses various techniques which help in protecting the network and a cryptic secure scheme has been proposed which helps to enhance the security standards in the wireless medium.

Author(s):  
dolfo Alan Sánchez Vázquez ◽  
Gregorio Martínez Pérez

In principle, computers networks were conceived to share resources and certain computing devices among a select group of people working in academic institutions. In this context, the security did not have high importance. Today, through the network circulates a lot of valuable data (budgets, credit card numbers, marketing data, etc.), much of which can be considered confidential. Here is where security takes great importance?so that these data cannot be read or modified by any third party, and the services offered are always available and only to authorized people (confidentiality, integrity, and readiness). When we refer to security, there are some terms of great importance. Risk is defined as any accidental or not prospective exhibition of information as consequence of the bad operation of hardware or the incorrect design of software. Vulnerabilities indicate when a failure in the operation of software and/or hardware elements exposes the system to penetrations. Starting from here we can define attack as an event against the good operation of a system, and it can be successful or not. If the attack is successful and access is obtained to the files and programs or control is obtained to the computers without being detected, then we are dealing with a penetration. This leads to an intrusion, which is a group of actions compromising the integrity, confidentiality, and readiness of computer resources (Sobh, 2006). The main objective of this article is to explain to the reader the main concepts regarding intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), and the particular issues that should be additionally considered when protecting wireless communication scenarios (in comparison with IDSs/IPSs in traditional wired networks). It also includes an extended view of the current state of the art of IDSs and IPSs in wireless networks, covering both research works done so far in this area, as well as an analysis of current open source IDSs and IPSs, and how they are dealing with the specific requirements of wireless communication networks. This article is organized as follows: First, we start with a summary of the main related works in the background section; then we give a description of the important concepts of security, a classification of intrusion detection systems, and a brief comparative of the operation of IDSs in wired and wireless networks. Next, we highlight certain research works exemplifying efforts done so far in wireless scenarios. We present the main ideas behind our current research work to model intrusions in wireless scenarios, before offering future directions of work and a summary of the main ideas expressed in the article.


Author(s):  
Goldendeep Kaur ◽  
Jyoteesh Malhotra

Due to the increasing demand of wireless networks, there is an increasing necessity for security as well. This is because unlike wired networks, wireless networks can be easily hacked form outside the building if proper security measures are not in place as wireless networks make use of radio waves and radio waves can leak outside of building at distances up to 300 feet or more. So everything we do on our network can be monitored by anyone who has wireless capabilities. This unauthorized access can be used as an essence by the hacker to launch various kinds of attacks like man-in-the-middle attacks, denial of service attacks, IP spoofing etc. As a result in addition to the firewalls, password protection techniques, virus detectors etc, additional levels of security is needed to secure the wireless networks. This paper focuses on comparing various techniques that are used to protect the users from these attacks by providing practical observations based on the network parameters time and scalability and also highlighted the best method in the end to combat the attacks at a superior level.  


Author(s):  
Simranjeet Kaur ◽  
Maninder Singh

With the increasing popularity of wireless local area network(WLAN),the demand for multimedia services encompassing VoIP, multimedia streaming and interactive gaming is increasing rapidly. The real-time services require stringent Quality of Service (QoS) guarantees for effective communication. While a lot of research has dealt with providing QoS support for real-time services in traditional wired networks, the shared and broadcast nature of the wireless medium necessitates the design of new solutions for wireless networks. In wireless networks, unlike wired networks, the communication from one node will consume  the bandwidth of the neighboring nodes and hence the  shared  bandwidth  can  be easily over-utilized. Therefore, to  provide  an  acceptable  level  of  QoS  for  the  real-time  services, it  is  necessary   to   control  the   utilization   of   the   shared  bandwidth. In this  paper , we  propose  an  efficient admission control scheme named Intra-flow contention scheme with CAC-OLSR routing protocol for WLAN networks which aims at  preserving  the  QoS  for  all  the  admitted  flows  by employing a low overhead  threshold  mechanism.  We  describe several  alternatives for the design of IAC and compare the performance of these alternatives using  simulation  results.


2018 ◽  
Vol 4 (2) ◽  
pp. 580-582
Author(s):  
Kshitija Ajabrao Chaple

WSN is one of the dominant and emerging technology that shows great promise for  various application in military, ecological and health related areas.WSN is highly vulnerable to attacks and inclusion of wireless communication technology incurs various types of security threats.WSN requires security measures due to sensitive data and as sensor may operate in hostile unattended environment.WSN suffer from constraints like low computational capability, small memory limited energy resources physical capture susceptibility and insecure wireless communication channel. These create security a challenge in WSN. In this article we provide a survey of security in WSN.We provide an outline with constraints and security requirement and attacks with their counter measures in WSN.


2021 ◽  
Vol 11 (11) ◽  
pp. 5039
Author(s):  
Yosoon Choi ◽  
Yeanjae Kim

A smart helmet is a wearable device that has attracted attention in various fields, especially in applied sciences, where extensive studies have been conducted in the past decade. In this study, the current status and trends of smart helmet research were systematically reviewed. Five research questions were set to investigate the research status of smart helmets according to the year and application field, as well as the trend of smart helmet development in terms of types of sensors, microcontrollers, and wireless communication technology. A total of 103 academic research articles published in the past 11 years (2009–2020) were analyzed to address the research questions. The results showed that the number of smart helmet applications reported in literature has been increasing rapidly since 2018. The applications have focused mostly on ensuring the safety of motorcyclists. A single-board-based modular concept unit, such as the Arduino board, and sensor for monitoring human health have been used the most for developing smart helmets. Approximately 85% of smart helmets have been developed to date using wireless communication technology to transmit data obtained from smart helmets to other smart devices or cloud servers.


2013 ◽  
Vol 662 ◽  
pp. 896-901
Author(s):  
Zong Jin Liu ◽  
Yang Yang ◽  
Zheng Fang ◽  
Yan Yan Xu

Because of rapid development of wireless communication technology, there is an increasing adoption of mobile advertising, such as location based advertising (LBA). To what extent can LBA improve advertising effectiveness is an important topic in the field of wireless communication technology research. Most researches quantify long term impacts of advertisings by VAR (Vector Autoregressive) model. However, compared to VAR model, VECM (Vector Error Correction Model) is a better method in that it allows one to estimate both a long-term equilibrium relationship and a short-term dynamic error correction process. In this study, we employ VECM to explore LBA’s (Location Based Advertising) and PUA’s (Pop-up Advertising) sales impact in both short and long terms. The developed VECM reveals that LBA’s sales impact is about more than2 times as big as PUA’s in short dynamic term and nearly 6 times bigger than PUA’s in long equilibrium term. These findings add to advertising and VECM literatures. These results can give managers more confident to apply wireless communication technology to advertising.


Author(s):  
Е.Е. Девяткин ◽  
Д.Н. Федоров ◽  
Я.М. Гасс ◽  
М.В. Иванкович

Рассмотрены и классифицированы существующие узкополосные беспроводные сети связи (УБСС), реализованные с использованием конвергентных решений. Показано, что появление нового объекта регулирования УБСС интернета вещей усиливает необходимость перехода от локальных корректировок законодательства в сфере связи к созданию инфо- коммуникационного кодекса Российской Федерации. Existing narrowband wireless communication networks using convergent solutions are reviewed and classified. It is shown that the emergence of narrowband wireless networks of Internet of things increases the need for transition from local adjustments of legislation in the field of communications to the creation of the Infocommunication Code of the Russian Federation.


Sign in / Sign up

Export Citation Format

Share Document