Wireless networks are an integral part of day-to-day life for many people, with businesses and home users relying on them for connectivity and communication. This scholarly research will examine the security vulnerabilities and threats in wireless communications. The security requirements of wireless networks including their authenticity, confidentiality, integrity, and availability will be identified and summarized. Different research and surveys have been undertaken by academic researchers on the current trend of wireless security from inception to date. These research findings will be analyzed, and efficient defense mechanisms and countermeasures will be investigated and provided for improving the security of wireless networks.
Abel, V.S. (2011) Survey of Current and Future Trends in Security in Wireless Networks. International Journal of Scientific & Engineering Research, 2, 2-7.
Zou, Y.L., Zhu, J., Wang, X. and Hanzo, L. (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends. Proceedings of the IEEE, 104, 1727-1765,. https://doi.org/10.1109/JPROC.2016.2558521
Millar, G., Kafchitsas, A., Mavrooulos, O., Kourtis, A., Xilouris, G., Christopoulou, M., Kolometsos, S., Montes de Oca, E., Nguyen, H.N., Pastor, A., Fernandez, S., Lopez, D. and Lefebvre, V., et al. (2020) 5G Security: Current Status and Future Trends. Intelligent Security and PervasIve trust for 5G and Beyond, 1-101. https://www.inspire-5gplus.eu/wp-content/uploads/2020/05/i5-d2.1_5g-security-current-status-and-future-trends_v1.0.pdf
Hakeem, A.S.A., Hussein, H.H. and HyungWon, K. (2022) Security Requirements and Challenges of 6G Technologies and Applications. Sensors, 1-43. https://www.mdpi.com/1424-8220/22/5/1969
Nagarajan, V., Arasan, V. and Huang, D. (2010) Using Power Hopping to Counter MAC Spoof Attacks in WLAN. 2010 7th IEEE Consumer Communications and Networking Conference, Las Vegas, 9-12 January 2010, 1-5. https://doi.org/10.1109/CCNC.2010.5421588
Ioannou, C. and Vasos, V. (2016) The Impact of Network Layer Attacks in Wireless Sensor Networks. International Workshop on Secure Internet of Things (SIoT), Heraklion, 26-30 September 2016, 20-28. https://doi.org/10.1109/SIoT.2016.009
Edvald, S. (2018) A Review of Network Layer and Transport Layer Attacks on Wireless Networks. International Journal of Modern Engineering Research (IJMER), 8, 23-27. http://www.ijmer.com/papers/Vol8_issue12/D0812012327.pdf
Alok, P. and Jatinderkumar, S. (2014) Attacks & Defense Mechanisms for TCP/IP Based Protocols. International Journal of Engineering Innovation & Research, 3, 17-23.