Abstract

There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating, authorizing the right users and also encrypting the data over the network. Data communication between computers has brought about countless benefits to users, but the same information technologies have created a gap, a vulnerable space in the communication medium, where the data that’s been exchanged or transferred, thereby causing threats to the data. Especially data on wireless networks are much exposed to threats since the network has been broadcasted unlike a wired network. Data security in the past dealth with integrity, confidentiality and ensuring authorized usage of the data and the system. Less or no focus was placed on the reactive approach or measures to data security which is capable of responding properly to mitigate an attacker and avoid harm and also to prevent future attacks. This research is going to expose the mechanisms and measures of data security in wireless networks from the reactive security approaches point of view and exposes the reactive approaches used to enhance data security.

Highlights

  • Securing data have not been completely achieved over the years due to different network types and their characteristics, but to a more percentage, data have been secured over a secure network as well

  • The reactive approach to data security in mobile-wireless network is like an Anomaly Detection System, which learns from the previous attack and based on the knowledge gained, it mitigates future attack by crosschecking the behavior of the attack in its database

  • Section four describes topics on cryptography algorithms for data security while section five draws a conclusion on the reactive approach security and concludes research on data security in wireless networks

Read more

Summary

Introduction

Securing data have not been completely achieved over the years due to different network types and their characteristics, but to a more percentage, data have been secured over a secure network as well. Data are transferred through the use of radio waves and making the data available through everywhere in space, enabling the corresponding users to receive the information anytime with the right device in this case a radio receiver. Protecting data in wireless environment or networks need a different mechanism altogether, in order to give the users a secure feel in data transfer and have accuracy, reliability, availability, integrity, and confidentiality. The reactive approach to data security in mobile-wireless network is like an Anomaly Detection System, which learns from the previous attack and based on the knowledge gained, it mitigates future attack by crosschecking the behavior of the attack in its database. Section three discusses reactive approach to data security and different security mechanisms to ensure data security in wireless network environment. Section four describes topics on cryptography algorithms for data security while section five draws a conclusion on the reactive approach security and concludes research on data security in wireless networks

Data Security
Encryption
Major Classification of Data Chiper
Hash Algorithms
Proactive Approach for Data Security
Reactive Approach for Data Security
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call