Abstract

The wireless communication technology gaining importance in extreme conditions in a very effective way due to its benefits. Compared to wired networks, wireless networks have many benefits in terms of flexibility, cost, and mobility. Wireless networks can be easily hacked by the outsiders if there is no proper security. Because of its increasing popularity, wireless networks need proper security measures in addition to the normal protections such as firewalls, virus detectors, etc. Providing the required additional security to the wireless networks is a challenging task. Security can be maintained by providing data authenticity, integrity confidentiality, and authorization. A survey on the security of wireless networks is put forward that discusses various techniques which help in protecting the network and a cryptic secure scheme has been proposed which helps to enhance the security standards in the wireless medium.

Highlights

  • Wireless networks are the flexible data communication systems that use wireless media such as radio frequency technology to communicate with computers and other network devices over the air

  • Data should be exchanged only between genuine users, due to the broadcasting character of the wireless networks the data is exposed to many threats. so it is very important to protect the network against attacks such as DOS attack, eavesdropping, etc

  • It is necessary to protect the data with the help of proper security measures

Read more

Summary

Introduction

Wireless networks are the flexible data communication systems that use wireless media such as radio frequency technology to communicate with computers and other network devices over the air. Sometimes these networks are called as WLAN or WIFI. Wired networks fail to provide flexibility and scalability. Disadvantages of wireless technology include additional security and the interruptions in the radio signals (due to bad weather, other wireless devices or obstructions like a wall). With the help of additional security measures such as authentication, trust-based routing, and other schemes; we can have protected data communication. Authentication of nodes in a wireless network is very important due to its openness to various security threats. The architecture of simple wireless networks is shown in fig 1

Security Necessities in A Wireless Environment
Security Issues in Wireless Networks
Literature Survey
The Cryptic Scheme
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.