Tuesday, May 5, 2020

Wireless Network Security and Preventive - MyAssignmenthelp.com

Question: Discuss about theWireless Network Security and Preventive Methods. Answer: Introduction The report depicts the importance of implementing security in the wireless network system for protecting it from high ranged data breaches. It has been assumed that with the rapid advances in technology, the accessibility of wireless devices are also increasing frequently in both workplaces and houses. This report elaborates the threats and risk associated to wireless network system. The challenges associated to the wireless system are very much difficult to mitigate thus relevant technologies are required to be adapted for this kind of systems those are also illustrates in this report. Different applicable technologies are there those should be used in the working and home ambiances for mitigating the security threats (Rawat et al., 2015). Apart from this, the report also elaborates certain research questions and vague areas of wireless network systems and also demonstrates the proper application of the technology Challenges In both home and workplaces wireless networks are widely using by the system developers. Typical challenges are associated to all the wireless networks such as wireless local area network, access point, service set identifier etc. The main challenge associated to the system is the security (Chen et al., 2016). If the system lacks appropriate security measures then the entire process will be failure due to lack of accurate prevention measures (Rezvani et al., 2015). In order to establish secured communication between different digital devices, WLAN is a local area network uses high frequency radio waves in the systems. In the traditional wireless communication networks, wireless communication has emerged as a major breakthrough (Lake et al., 2014). The messiness of the network system has completely reduced after the usage of wireless network system. The challenges associated to this are as follows: Vulnerability in wireless security network: For the back to back sensor network architecture, the wireless sensor network forms single point breakdown. The main cause for the security laps is the unattended sensor nodes (Li, et al., 2014). In order to trace the wireless intruders, there is a boundary for the existing location tracing methods. In the revised specification of IEEE 802.11i, the threats and network challenges are not yet considered. The sensor networks for monitoring approach are in the vulnerability zone. The recent security models and customary security threats: The current wireless personal area network has an immature security schemes (He et al., 2015). The security models developed for wired networks are not at all effective for the wireless networks. For the heterogeneous network and for the smart home network the identified problems are respectively inadequate security and limitation issue. Attacks on the wireless sensor networks: In order to develop guarantee for security in all the layers of the networks there is no common security model (Rashid Rehmani, 2016). Against the prevalent security threats, protection mechanisms are very much weak. The security adapted for the security and network layers are very weak. Even the security measures for the overall wireless sensor network are very weak. Attacks on Ad-hoc wireless network: In most of the cases it has been identified that the cryptographic solution for intruder detection are very weak (Butun, Morgera Sankar, 2014). For the worm attacks there is no such response method has been developed by the network security developers. Different types of wireless network security technologies are there those are used widely both in the workplaces and personnel uses. However, for error application in the corporate field, different security concerns have been adopted (Rashid Rehmani, 2016). In order to improve the security features, the vendors of wireless security providers play active roles accordingly still before practical implementation all the threats are needed to be considered properly. In the adaptation process of wireless local area network, security is the major threat. Not only small but also large enterprises are facing major security threats due to lack of proper technologies (Rezvani et al., 2015). Security is the responsibility for both the buyers and for the service providers. In order to develop the security approaches, the elements of wireless security those should be implemented are as follows: The unauthorized users are required to be discouraged through the implementation of proper authentication approaches. The rouge access points must be eliminated from the system for preventing it from unauthorized access. Even during the data transition phase the information must keep secured from the external attackers. The available wireless security solution include wi fi protected access (WPA), the Wi Fi Protected Access 2(WPA2), Virtual private networking (VPN3) (Butun, Morgera Sankar, 2014). Proper implementation of application and network firewall and virtual private network will help the enterprises from unauthorized access. It has been found that, with the VPN network the confidential information of one enterprise cannot be leaked and the confidentiality could be maintained well. One of an evolving security framework, for the WLAN and the interoperability issue has been identified (Razzaque, Salehi Cheraghi, 2013). Access in wi fi increases the rate of security threat mostly. Through the wi fi connection, the attackers might attack to the security networks and access server for stealing information for misusing. Problems In the mobile Ad Hoc network, for finding out the intruders the cryptographic based schemes can also be failed accordingly. The Ad hoc network routing protocols are absolutely prone towards the security attacks (Jing et al., 2014). The majority of the routing protocols are concern only with the router lengths. During the deployment phase, the WSN gateway single point failure might occur. However, after the sensor nodes deployment, they might remain unattended (Butun, Morgera Sankar,l 2014). While considering the protocol issue, it has been found that, the protocol link might get failed in both the network and data link layer of the network models. Relevant Technologies Proper Intrusion Detection System (IDS) can be used for mitigating the issues associated to wireless network system. During the root construction phase, different kinds of attack prevention, methods can be used by the system developers (Shamshirband et al., 2014). From system analysis, it has been found that, it is necessary for the security metrics to being the integral part of the security metrics. The WSN issues can be mitigated by increasing the fault endurance of the network (Wu, Ota Dong Li, 2016). All the nodes of the network are required to be checked periodically. In order to handle the security issues of protocol proper security architectures are required to be implemented by the system developers. Applications of the Technologies Development of cryptographic technology: In order to mitigate the network associated security threats the different cryptographic protocols are required to be developed in both the network and application layers in the network models (Rohbanian et al., 2013). It will help the system from external attackers such as DOS attack and DDOS attacks. With the help of the RADIUS authentication only the authorized users will be able access the network officially (Jing et al., 2014). The session keys will increase the security range of the system and in the Bluetooth devices, the proper PIN are required to be entered for creating the pair only with the known devices. Enhance Compressed Real-time Transport Protocol (ECRTP) is another technological application that can be used in the wireless point to point links (Butun, Morgera Sankar, 2014). The error rates in the bits can also be mitigated with the help of this protocol. The issues of heterogeneous wireless networks can also be mitigated with the help of the integration model network (Rezvani et al., 2015). On the other hand, there is another protocol named as OLSR which is used to keep the neighbor information secured from the external attackers. Clarify Vague Areas The system is very much efficient and basically for increase the overall business effectiveness most of the business organizations and even for personnel uses people do use this applications widely (Razzaque, Salehi Cheraghi, 2013). Though, one of the vague parts of the network system is the improper authentication. Research Questions What are the special training and development programs that should be developed for the wireless network security? Whether the security measures are effective for both workplaces and homes? What are protocols that must be used for the network security? What are the major challenges for wireless network security? Whether after detecting issue the appropriate mitigation technologies are available or not? What are the different inherited issues of security issues? Whether the energy issues prohibit the security schemes? What are the tools that could be used for data protection? Conclusion From the overall discussion it can be concluded that in order to keep the sensitive information secured from the external attackers security is one of the major concerns that is required to be considered. The report mentioned all the security threats and challenges associated to wireless sensor network. Different research questions associated to wireless network security are also illustrated in this report. Apart from this, in order to mitigate the challenges different technologies are adapted and applied on the security threats. The proper applications of those technologies are also illustrated in this report. Apart from the challenges mitigation strategies, also the report demonstrated different relevant technologies those can be developed for combat the security related issues. References Butun, I., Morgera, S. D., Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks.IEEE Communications Surveys Tutorials,16(1), 266-282. Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X. (2016). Software-defined mobile networks security.Mobile Networks and Applications,21(5), 729-743. He, D., Chan, S., Guizani, M. (2015). Mobile application security: malware threats and defenses.IEEE Wireless Communications,22(1), 138-144. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges.Wireless Networks,20(8), 2481-2501. Lake, D., Milito, R., Morrow, M., Vargheese, R. (2014). Internet of things: Architectural framework for ehealth security.Journal of ICT Standardization, River Publishing,1. Li, W., Yi, P., Wu, Y., Pan, L., Li, J. (2014). A new intrusion detection system based on KNN classification algorithm in wireless sensor network.Journal of Electrical and Computer Engineering,2014. Rashid, B., Rehmani, M. H. (2016). Applications of wireless sensor networks for urban areas: a survey.Journal of Network and Computer Applications,60, 192-219. Rawat, D. B., Yan, G., Bista, B. B., Weigle, M. C. (2015). Trust On the Security of Wireless Vehicular Ad-hoc Networking.Ad Hoc Sensor Wireless Networks,24(3-4), 283-305. Razzaque, M. A., Salehi, A., Cheraghi, S. M. (2013). Security and privacy in vehicular ad-hoc networks: survey and the road ahead. InWireless Networks and Security(pp. 107-132). Springer Berlin Heidelberg. Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks.IEEE Transactions on Dependable and Secure Computing,12(1), 98-110. Rohbanian, M. R., Kharazmi, M. R., Keshavarz-Haddad, A., Keshtgary, M. (2013). Watchdog-LEACH: a new method based on LEACH protocol to secure clustered wireless sensor networks.arXiv preprint arXiv:1310.3637. Shamshirband, S., Patel, A., Anuar, N. B., Kiah, M. L. M., Abraham, A. (2014). Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks.Engineering Applications of Artificial Intelligence,32, 228-241. Wu, J., Ota, K., Dong, M., Li, C. (2016). A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities.IEEE Access,4, 416-424.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.