A Review on Wireless Network Security

  title={A Review on Wireless Network Security},
  author={Sandeep Sharma and Rajesh Mishra and Karan Singh},
Computer network is very essential part of our life by which we can share the information via different technologies such as wired or wireless. Generally the wireless is mostly adopted technology by us due to various advantages like ease of installation, mobility, reconfigure ability, low infrastructural cost etc. but suffers from more attacks as the wireless channel is open. Therefore, many researchers are working in this hot area to secure the wireless communication. In this paper, we discuss… 
Enhanced Wi-Fi Security of University Premises Using MAC Address and Randomly Generated Password
An improved security protocol is proposed for University premises, which is a combination of the process of MAC address filtering and random password generation, which has universality as the device and software needed for it is available all over the world.
Simulation of Wormhole Attack in Wireless Sensor Networks using AOMDV Protocol
The proposed technique to identify and prevent wormhole attack using Adhoc On-demand Multipath Distance Vector (AOMDV) protocol is implemented in NS2.35 simulator and various performance parameters are evaluated.
Exploring the Weak Links of Internet Security: A Study of WiFi Security in Hong Kong
There is a significant gender difference in WiFi security perceptions and knowledge among WiFi users in Hong Kong and it is suggested that steps must be taken to raise the awareness of the users of the importance of WiFi security and targeted measures must be take to help users, especially female users to use WiFi safely.
The QoS routing mechanism based on key frame and improved ant colony optimization algorithm for wireless multimedia sensor networks
A method to handle sudden network congestion is proposed–improving the way of key frame transmission, namely increasing the compression ratio of the key frames.
Time-slots Transmission Data Algorithms into Network
  • M. Jemmali, Hani Alquhayz
  • Computer Science
    2020 International Conference on Computing and Information Technology (ICCIT-1441)
  • 2020
The router dispatching problem in case of bespoke communication and masquerade communications is considered and the related scheduling problem is solved utilizing six heuristics.
Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
The effectiveness of RPL-NIDDS17 is shown by statistically analysing the probability distribution of features, correlation between features, and compared with the results of KDD99, UNSW-NB15, WSN-DS datasets.
User Preferences With Urgent-Time Intervals in a Wireless-Network
Two algorithms for transmitting data from the sender to the receiver are developed and a scheduling problem due to unavailable machines and jobs will be solved, which is NP-hard.
An Ontology-Based Cybersecurity Framework for the Internet of Things
An ontology-based cybersecurity framework using knowledge reasoning for IoT is proposed, composed of two approaches: design time, which provides a dynamic method to build security services through the application of a model-driven methodology considering the existing enterprise processes, and runTime, which involves monitoring the IoT environment, classifying threats and vulnerabilities, and actuating in the environment ensuring the correct adaptation of the existing services.
Mitigation of Vehicle Distribution in an EV Sharing Scheme for Last Mile Transportation
The results indicate that the proposed system platform can provide an adequate solution for last mile transportation through remote driving.


Security in Wireless Data Networks : A Survey Paper
This paper illustrates the key concepts of security, wireless networks, and security over wireless networks by explaining the main specifications of the common security standards, and explains the concept of WMAN (Wireless Metropolitan Access Network) and its security specifications.
WLAN standards and Wireless networking security
The paper includes an overview of the existing standards, literary research on their security flaws and information on what is being done to fix them, and suggests some workarounds to avoid the security holes.
Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks]
It is argued that new security paradigms which exploit physical layer properties of the wireless medium, such as the rapid spatial, spectral, and temporal decorrelation properties ofThe radio channel, can enhance confidentiality and authentication services.
A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)
This paper tries to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness, and makes a comparison among WEP and WPA and WEP2 as all wireless security protocols in Wi-Fi technology.
Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks]
An overview of various noncryptographic mechanisms for user authentication and device identification in wireless networks using lower/physical layer properties or information is provided.
Intercepting mobile communications: the insecurity of 802.11
Several serious security flaws in the Wired Equivalent Privacy protocol are discovered, stemming from mis-application of cryptographic primitives, which lead to a number of practical attacks that demonstrate that WEP fails to achieve its security goals.
Practical attacks against WEP and WPA
An improved key recovery attack on WEP, which reduces the average number of packets an attacker has to intercept to recover the secret key.
Wireless hacking - a WiFi hack by cracking WEP
A look at common threats, vulnerabilities related with wireless networks, the entire process of cracking WEP (Wired Equivalent Privacy) encryption of WiFi, and the necessity to become familiar with scanning tools to help survey the area and tests to run so as to strengthen the air signals.
A Passive Approach to Wireless NIC Identification
This work proposes the use of spectral analysis to identify a type of wireless network interface card that can be applied to support the detection of unauthorized systems that use wireless network interfaces that are different from that of a legitimate system.
Network Security Using Cryptographic Techniques
Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software, and information in a network.