Wireless Security and Privacy Issues

Author(s):  
Joarder Kamruzzaman

Security and privacy protection are very strong requirements for the widespread deployment of wireless technologies for commercial applications. The primary aim of this chapter is to present an overview of the security and privacy issues by highlighting the need to secure access to wireless networks and the loss that might accrue from the breach of a network. The vulnerabilities of the IEEE 802.11 and Bluetooth networks are discussed, and a paradigm for secure wireless network is presented. The legal framework guiding the privacy issues in wireless communications is also presented.

Author(s):  
Nurul Fatini Azhar ◽  
Qi Jie Ngoo ◽  
Tae Hyun Kim ◽  
Kohei Dozono ◽  
Fatima tuz Zahra

Communication between devices has transitioned from wired to unwired. Wireless networks have been in use widely around the globe since the advent of smartphones, IoT devices and other technologies that are compatible with wireless mode of communication. At the same time security issues have also increased in such communication methods. The aim of this paper is to propose security and privacy issues of the wireless networks and present them through comprehensive surveys. In context of security issues, there are 2 typical DDoS attacks - HTTP flood and SYN flood. Other than DDoS attacks, there are several other threats to wireless networks. One of the most prevalent include security issues in Internet of Things. In terms of privacy issues in a wireless network, location-based applications, individual data, cellular network and V2G (Vehicle to Grid) network are surveyed. The survey is hosted using questionnaire and responses of 70 participants is recorded. It is observed from the survey results that many groups of people lack the knowledge of security and privacy of wireless technologies and networks despite their increased use, however, students are relatively more aware and have strong knowledge of those issues. It is concluded from the results that an effective solution to these problems can be hosting campaigns for spreading the security and privacy laws to help the groups of people who are lagging behind in this domain of knowledge become more aware. A unique solution is also presented to overcome the security issues which include implementation of detection and mitigation techniques, implementing Blockchain in the IoT devices and implementing fog computing solutions. The unique solutions to overcome the privacy issues are proposed in the form of a privacy approach from the LBS server between pairs of users to increase the implementation of DSPM and blockchain as a solution.


Author(s):  
Isaac Chin Eian ◽  
Ka Yong Lim ◽  
Majesty Xiao Li Yeap ◽  
Hui Qi Yeo ◽  
Fatima Z

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.


Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Author(s):  
Alya Hannah Ahmad Kamal ◽  
Caryn Chuah Yi Yen ◽  
Pang Sze Ling ◽  
Fatima -tuz-Zahra

The rapid growth of network services, Internet of Things devices and online users on the Internet have led to an increase in the amount of data transmitted daily. As more and more information is stored and transmitted on the Internet, cybercriminals are trying to gain access to the information to achieve their goals, whether it is to sell it on the dark web or for other malicious intent. Through thorough literature study relating to the causes and issues that are brought from the security and privacy segment of wireless networks, it is observed that there are various factors that can cause the networks to be an insecure; especially factors that revolve around cybercriminals with their growing expertise and the lack of preparation and efforts to combat them by relevant bodies. The aim of this paper is to showcase major and frequent security as well as privacy issues in wireless networks along with specialized solutions that can assist the related organizations or the public to fathom how great of an impact these challenges can bring if every related stakeholder took a step in reducing them. Through this paper it is discovered that there are many ways these challenges can be mitigated, however, the lack of implementation of privacy and security solutions is still largely present due to the absence of practical application of these solutions by responsible parties in real world scenarios.


Author(s):  
Radi Romansky ◽  
Irina Noninska

The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of secure access to all resources of an e-learning environment is very important and adequate technological and organizational measures for authentication, authorization and protection of personal data must be applied. Strong security procedures should be proposed to protect user's profiles, designed after successful registration and all personal information collected by educational processes. The goal of this article is to present an idea to combine traditional e-learning technologies with new opportunities that give mobile applications, cloud services and social computing. These technologies can endanger data security since they make possible remote access to resources, sharing information between participants by network communications. In order to avoid data vulnerabilities users must be identified and authenticated before, i.e. to be allowed to access information resources otherwise integrity and confidentiality of e-learning system could be destroyed. In order to propose solution basic principles of information security and privacy protection in e-learning processes are discussed in this article. As a result, an organizational scheme of a system for information security and privacy is proposed. Based on these principles a graph formalization of access to the system resources is made and architecture for combined (heterogenic) e-learning architecture with secure access to the resources is designed. Analytical investigation based on designed Markov chain has been carried out and several statistical assessments delivered by Develve software are discussed.


Author(s):  
Joarder Kamruzzaman ◽  
A. K. M. Azad ◽  
Nemai Chandra Karmakar ◽  
Gour Karmakar ◽  
Bala Srinivasan

Security and privacy protection are very critical requirements for the widespread deployment of RFID technologies for commercial applications. In this chapter, the authors first present the security and privacy requirement of any commercial system, and then highlight the security and privacy threats that are unique to an RFID system. The security and privacy preserving protocols for RFID system proposed in literature are elaborately discussed, analyzing their strengths, vulnerabilities, and implementation issues. The open research challenges that need further investigation, especially with the rapid introduction of diverse RFID applications, are also presented.


CONVERTER ◽  
2021 ◽  
pp. 70-79
Author(s):  
Dongxian Yu, Jiatao Kang, Junlei Dong

The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ideas of the Internet of things are perception, control, transmission and intelligence. Through technical means to achieve the coordination between things, people and things, and people, so as to form a larger complex network system on the basis of sensor network, Internet and mobile communication network. The data Shared by Internet of things information is closely related to personal life behaviors, and the information has a greater perceived correlation with each other. This kind of sensibility and sensitivity put forward higher requirements for the security and privacy protection of Internet of things information sharing. However, due to the characteristics of network structure, terminal equipment, communication mode and application scenario, some security and privacy issues unique to the Internet of things cannot be solved directly through existing Internet security technologies. It is necessary to conduct in-depth research on the key technologies of Internet of things security and privacy protection. This article briefly describes the Internet of things security and privacy issues, then, it gives the research and application status of Internet of things security and privacy protection at home and abroad, then lists the key technical problems in Internet of things security and privacy protection. And for communication between large scale collaborative services. Based on publish/subscribe paradigm, this paper constructs collaborative communication facilities of Internet of things services suitable for large-scale distribution, and an access control architecture for managing service synergy interactions, achieve confidentiality of data exchange between services and privacy protection of service policies.


2009 ◽  
pp. 879-894
Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


2021 ◽  
Vol 11 (4) ◽  
pp. 1772
Author(s):  
Sultan Algarni ◽  
Fathy Eassa ◽  
Khalid Almarhabi ◽  
Abduallah Almalaise ◽  
Emad Albassam ◽  
...  

The distributed nature of Internet of Things (IoT) and its rapid increase on a large scale raises many security and privacy issues. Access control is one of the major challenges currently addressed through centralized approaches that may rely on a third party and they are constrained by availability and scalability, which may result in a performance bottleneck. Therefore, this paper proposes a novel solution to manage the delivery of lightweight and decentralized secure access control of an IoT system based on a multi-agent system and a blockchain. The main objective of the proposed solution is to build Blockchain Managers (BCMs) for securing IoT access control, as well as allowing for secure communication between local IoT devices. Moreover, the solution also enables secure communication between IoT devices, fog nodes and cloud computing.


2020 ◽  
Author(s):  
Sun Jun Ee ◽  
Jeshua Woon Tien Ming ◽  
Jia Suan Yap ◽  
Scott Chuen Yuen Lee ◽  
Fatima tuz Zahra

In this modern day and age, wireless networks are everywhere. It is not a far stretch to say that it is downright crucial due to its ability to keep people connected and updated everywhere from universities and workplaces down to our personal homes. Though the benefits of wireless networks are undeniable, it also brings a new host of security concerns due to the amount of sensitive data being transmitted through these networks. A simple attack such as packet sniffing is enough to “sniff” out just enough data to cripple even giant corporate bodies if left unchecked. The aim of this research paper is to dissect and discuss the security and privacy issues of wireless networks that surround us. An interesting finding would be that wireless networks are heavily susceptible to both malicious attacks such as denial of service attacks and passive attacks like eavesdropping. It was also noted that information is more easily obtainable through wireless networks as compared to wired networks due to the ability to gleam information from long distances without having to be physically present on site. A literature review and a survey were conducted to learn about the opinions of casual users of wireless networks. The information gathered suggests that while there are many who care about privacy, they still lack the necessary knowledge to protect said privacy. These users carelessly connect to public wireless networks wherever it is available without proper precaution and care. Appropriate relevant solutions are presented based on literature study to overcome insecure wireless network usage practices in order to avoid active and passive attacks.


Sign in / Sign up

Export Citation Format

Share Document