全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

Trends in Wireless Network Security

DOI: 10.4236/oalib.1111033, PP. 1-17

Subject Areas: Information and Communication: Security, Privacy, and Trust, Technology, Computer and Network Security

Keywords: Wireless Network, Wireless Security, CIA triad, WLANs, WEP, WPA, WiMAX, WiGIG

Full-Text   Cite this paper   Add to My Lib

Abstract

Wireless networks are an integral part of day-to-day life for many people, with businesses and home users relying on them for connectivity and communication. This scholarly research will examine the security vulnerabilities and threats in wireless communications. The security requirements of wireless networks including their authenticity, confidentiality, integrity, and availability will be identified and summarized. Different research and surveys have been undertaken by academic researchers on the current trend of wireless security from inception to date. These research findings will be analyzed, and efficient defense mechanisms and countermeasures will be investigated and provided for improving the security of wireless networks.

Cite this paper

Eluwa, A. C. (2024). Trends in Wireless Network Security. Open Access Library Journal, 11, e1033. doi: http://dx.doi.org/10.4236/oalib.1111033.

References

[1]  Abel, V.S. (2011) Survey of Current and Future Trends in Security in Wireless Networks. International Journal of Scientific & Engineering Research, 2, 2-7.
[2]  Zou, Y.L., Zhu, J., Wang, X. and Hanzo, L. (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends. Proceedings of the IEEE, 104, 1727-1765,. https://doi.org/10.1109/JPROC.2016.2558521
[3]  Millar, G., Kafchitsas, A., Mavrooulos, O., Kourtis, A., Xilouris, G., Christopoulou, M., Kolometsos, S., Montes de Oca, E., Nguyen, H.N., Pastor, A., Fernandez, S., Lopez, D. and Lefebvre, V., et al. (2020) 5G Security: Current Status and Future Trends. Intelligent Security and PervasIve trust for 5G and Beyond, 1-101. https://www.inspire-5gplus.eu/wp-content/uploads/2020/05/i5-d2.1_5g-security-current-status-and-future-trends_v1.0.pdf
[4]  Hakeem, A.S.A., Hussein, H.H. and HyungWon, K. (2022) Security Requirements and Challenges of 6G Technologies and Applications. Sensors, 1-43. https://www.mdpi.com/1424-8220/22/5/1969
[5]  Nagarajan, V., Arasan, V. and Huang, D. (2010) Using Power Hopping to Counter MAC Spoof Attacks in WLAN. 2010 7th IEEE Consumer Communications and Networking Conference, Las Vegas, 9-12 January 2010, 1-5. https://doi.org/10.1109/CCNC.2010.5421588
[6]  Ioannou, C. and Vasos, V. (2016) The Impact of Network Layer Attacks in Wireless Sensor Networks. International Workshop on Secure Internet of Things (SIoT), Heraklion, 26-30 September 2016, 20-28. https://doi.org/10.1109/SIoT.2016.009
[7]  Edvald, S. (2018) A Review of Network Layer and Transport Layer Attacks on Wireless Networks. International Journal of Modern Engineering Research (IJMER), 8, 23-27. http://www.ijmer.com/papers/Vol8_issue12/D0812012327.pdf
[8]  Alok, P. and Jatinderkumar, S. (2014) Attacks & Defense Mechanisms for TCP/IP Based Protocols. International Journal of Engineering Innovation & Research, 3, 17-23.

Full-Text


Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133