An open, unencrypted wireless network can 'sniff' or capture and record the traffic, gain unauthorized access to internal network resources as well as to the internet, and then use the information and resources to perform disruptive or illegal acts.Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking is prone to some security. Wireless networks relatively easy to break into, and even use wireless technology to hack into wired networks.The risks to users of wireless technology have increased as the service has become more popular.As a result, it is very important that enterprises define effective wireless security policies that guard against unauthorized access to important resources.
Today, government organizations, military, finance sector, hospitals etc., deals with lots of confidential data on computers and they use to pass these information to many other networks around the globe. Therefore, these confidential information need to be protected from cyber attacks and cyber security helps keep them out of hackers reach. The main advantages of cyber security are:
Frame relay is a packet-switching telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs). The service, once widely available and implemented, is in the process of being discontinued by major Internet service providers. Sprint ended its frame relay service in 2007, while Verizon said it plans to phase out the service in 2015. AT&T stopped offering frame relay in 2012 but said it would support existing customers until 2016.
An open, unencrypted wireless network can 'sniff' or capture and record the traffic, gain unauthorized access to internal network resources as well as to the internet, and then use the information and resources to perform disruptive or illegal acts.Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking is prone to some security. Wireless networks relatively easy to break into, and even use wireless technology to hack into wired networks.The risks to users of wireless technology have increased as the service has become more popular.As a result, it is very important that enterprises define effective wireless security policies that guard against unauthorized access to important resources.
Today, government organizations, military, finance sector, hospitals etc., deals with lots of confidential data on computers and they use to pass these information to many other networks around the globe. Therefore, these confidential information need to be protected from cyber attacks and cyber security helps keep them out of hackers reach. The main advantages of cyber security are:
Frame relay is a packet-switching telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs). The service, once widely available and implemented, is in the process of being discontinued by major Internet service providers. Sprint ended its frame relay service in 2007, while Verizon said it plans to phase out the service in 2015. AT&T stopped offering frame relay in 2012 but said it would support existing customers until 2016.
The WEP protocol was introduced with the original 802.11 standards as a means to provide authentication and encryption to wireless LAN implementations.
WPA, became available in 2003, and it was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP encryption standard
1
Table of Contents
Wireless Network Security3
Introduction3
Overview of Wireless Technologies4
Standards of Wireless Specification:6
Security Features6
Wireless Threats7
Wireless Networks Attacks8
Conclusion9
References10
Wireless Network SecurityIntroduction
The wireless technology has been under threat in terms of security because of hacking aspect, the wireless technology has been under threat as the same as the wired network, but on the other hand they are vulnerable to additional risk( Silva, Santos & Nogueira,2015). The wireless network usually transmits data via the radio frequencies that enhance the possibility of tapping the information by threaten invaders if it is not properly protected. The threaten invaders have founded a way to get the access to the wireless system to steal or destroy the original information, the attackers launch strikes which are related to network bandwidth and prevent the authorized users to use their desired services, and they also keep an eye on the conversations that are taking place. For instance, the hackers or threaten invaders successfully get into wireless systems to have access to important information. The project mainly focuses on the IEEE802.11 and IEEE802.16 which are group of standards for wireless local area networks (WLANs) and metropolitan area networks (WMANs) respectively.Overview of Wireless Technologies
The wireless technologies make the gadgets to have communication without any connection physically, implying that they do not need peripheral or network cabling. The wireless range from the complicated environments, for instance mobile networks that includes 3G mobile phones and local area networks, to less complicated gadgets such as microphones without wire, earphones and other gadgets which will not save or process data and usually used for small range procedures like infrared or communications via Bluetooth (BT) (Egners, Herrmann & Meyer,2015).
Typical IP network wireless devices or infrastructure
Access points or base stations
· Station wireless
· Router wireless
Retransmission devices (Sun, Yan, Zhang & Rong, 2015).
· Repeater wireless
· Network bridge wireless
End points
· Cards or adapters wireless
· Laptops
· PDAs
· Mobile telephones
Infrared devices, such as cordless computer keyboards, remote controls and mice all needs a direct line of sight between the receiver and transmitter to complete the link. Even though the infrared communication replaced by BT technology in most of the gadgets, some legacy standard gadgets still use IR for short range communication (Illiano, & Lupu, 2015).
Network classification of wireless networks
Wireless networks act as date transmitter mechanism between other wireless communications and the traditional wired networks. Wireless network can be structured in different ways but they are frequently categorized into 4 main categories based on their coverage range.
· Wireless wide area network (WWAN)
Which invol ...
The WEP protocol was introduced with the original 802.11 standards as a means to provide authentication and encryption to wireless LAN implementations.
WPA, became available in 2003, and it was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP encryption standard
1
Table of Contents
Wireless Network Security3
Introduction3
Overview of Wireless Technologies4
Standards of Wireless Specification:6
Security Features6
Wireless Threats7
Wireless Networks Attacks8
Conclusion9
References10
Wireless Network SecurityIntroduction
The wireless technology has been under threat in terms of security because of hacking aspect, the wireless technology has been under threat as the same as the wired network, but on the other hand they are vulnerable to additional risk( Silva, Santos & Nogueira,2015). The wireless network usually transmits data via the radio frequencies that enhance the possibility of tapping the information by threaten invaders if it is not properly protected. The threaten invaders have founded a way to get the access to the wireless system to steal or destroy the original information, the attackers launch strikes which are related to network bandwidth and prevent the authorized users to use their desired services, and they also keep an eye on the conversations that are taking place. For instance, the hackers or threaten invaders successfully get into wireless systems to have access to important information. The project mainly focuses on the IEEE802.11 and IEEE802.16 which are group of standards for wireless local area networks (WLANs) and metropolitan area networks (WMANs) respectively.Overview of Wireless Technologies
The wireless technologies make the gadgets to have communication without any connection physically, implying that they do not need peripheral or network cabling. The wireless range from the complicated environments, for instance mobile networks that includes 3G mobile phones and local area networks, to less complicated gadgets such as microphones without wire, earphones and other gadgets which will not save or process data and usually used for small range procedures like infrared or communications via Bluetooth (BT) (Egners, Herrmann & Meyer,2015).
Typical IP network wireless devices or infrastructure
Access points or base stations
· Station wireless
· Router wireless
Retransmission devices (Sun, Yan, Zhang & Rong, 2015).
· Repeater wireless
· Network bridge wireless
End points
· Cards or adapters wireless
· Laptops
· PDAs
· Mobile telephones
Infrared devices, such as cordless computer keyboards, remote controls and mice all needs a direct line of sight between the receiver and transmitter to complete the link. Even though the infrared communication replaced by BT technology in most of the gadgets, some legacy standard gadgets still use IR for short range communication (Illiano, & Lupu, 2015).
Network classification of wireless networks
Wireless networks act as date transmitter mechanism between other wireless communications and the traditional wired networks. Wireless network can be structured in different ways but they are frequently categorized into 4 main categories based on their coverage range.
· Wireless wide area network (WWAN)
Which invol ...
Attacks and Risks in Wireless Network Securityijtsrd
Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. A. C. Sounthararaj | B. VeeraPandiyan "Attacks and Risks in Wireless Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18625.pdf
an overview of wireless local area networks and security systemIJAEMSJORNAL
Wireless Communication is one of the fastest growing technologies in the world which is an application of technology and science in the modern life. Radio and telephone to current devices such as mobile phone, laptops, television broadcasting are the most essential part of our life. Wireless LAN, Cellular Telephony and Satellite based communication networks are the several parts of the wireless communication industry. In this paper, we have emphasized on a study of Wireless LAN technologies and its concerned issues: Wireless Networking, What WLANs are, History of WLAN, Need of WLAN, Types of WLAN, Advantages of WLAN, IEEE 802.11 Standards, Network Security.
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...CSCJournals
Future communication networks will integrate `SSS\' concepts such as social networking, social networking device, and social desktop. In this paper, we focus on applications over social networking sites (SNS). Due to emerging bandwidth-hungry applications over SNS, hybrid fiber-wireless (FiWi) access networks are a promising solution to mitigate the last mile bandwidth bottleneck. SNS are particularly vulnerable to Automated Social Engineering (ASE) attacks due to their powerful information gathering functionalities. We discuss how integrated FiWi access networks supporting SNS systems perform, and how they can deal with threats related to ASE. In addition, we explain how an ASE attack may be launched from different networking platforms and propose a security architecture for ASE attacks over FiWi access networks.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksIJNSA Journal
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used to find them are mobile and easy to access. Securing wireless networks can be difficult because these networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to compromise it. In recent years, a range of technologies and mechanisms have helped makes networking more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related authentication, confidentiality and integrity problems. It discovered that strength of each solution depends on how well the encryption, authentication and integrity techniques work. The work suggested using a Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth comparative analysis of each of the security mechanisms is driven by review of related work in WLAN security solutions.
Evaluation of enhanced security solutions inIJNSA Journal
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially
vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used
to find them are mobile and easy to access. Securing wireless networks can be difficult because these
networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to
compromise it. In recent years, a range of technologies and mechanisms have helped makes networking
more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related
authentication, confidentiality and integrity problems. It discovered that strength of each solution depends
on how well the encryption, authentication and integrity techniques work. The work suggested using a
Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth
comparative analysis of each of the security mechanisms is driven by review of related work in WLAN
security solutions.
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESIJNSA Journal
In this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we're focusing on some of those goals for MITM attackers - message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Thesis Statement for students diagnonsed withADHD.ppt
A Survey On Wireless security
1. I E S College Of Engineering
Dept .Of Electronics And Communication Engineering
SEMINAR : A SURVEY ON WIRELESS SECURITY: TECHNICAL CHALLENGES
AND FUTURE TRENDS
Guided By : Ms.LINU BABU Presented By: SARATH K
3. INTRODUCTION
Wireless communication is a widely used technology nowadays.
The number of mobile subscribers has reached 6.8 billion worldwide and
almost 40% of the world’s population is now using the Internet.
Due to broadcast nature wireless communication is vulnerable to security
threats like Hacking , Eavesdropping , Malicious attacks etc…
It is of paramount importance to improve wireless communications security
to fight against cybercriminal activities
4. LITERATURE SURVEY
Wireless Communication Security Requirements :
AUTHENTICITY : Differentiate Authorized from unauthorized users
CONFIDENTIALITY : Limit confidential data access to intended users only
INTEGRITY : Guarantee accuracy of the transmitted info without falsification
AVAILABILITY : Make sure authorised user is able to acces the network
whenever needed
6. OSI LAYERED ARCHITECTURE
Common for both wired and wireless communication systems
Each layer is separately protected using various mechanisms such as MAC
Address, WPA/WPA2,Cryptographic Keys etc…
Physical and MAC Layer differs for wireless communication
Each layer supports various protocols like HTTP,FTP,TCP,UDP etc…
Each layer is vulnerable to different type of attacks like Eaves dropping,
MAC spoofing, Malware attack ,Jamming etc…
7. SECURITY VULTERABILITIES
PHYSICAL LAYER ATTACKS
The broadcast nature of wireless communications makes its physical layer
extremely vulnerable to external attacks
Jamming (DoS Attack) and Eavesdropping are two main attacks considering
physical layer.
Typically cryptographic techniques relying on secret keys are adopted for
preventing eavesdropping attacks from intercepting the data transmission.
Spread spectrum techniques are effective means of defending against DoS
attacks by spreading the transmit signal over a wider spectral bandwidth than its
original frequency band (FHSS /DSSS)
8. MAC LAYER ATTACKS
Each network node is equipped with a NIC and has a unique MAC address,
which is used for user authentication
An attacker that attempts to change its assigned MAC address with a
malicious intention is termed as MAC spoofing
A MAC attacker may overhear the network traffic and steal a legitimate
node’s MAC address by analysing the overheard traffic is referred to as an
Identity-theft attack
MITM Attack is the impersonation of a pair of communicating nodes.
9. NETWORK LAYER ATTACKS
The network-layer attacks mainly aim for exploiting IP weaknesses
Main network layer attacks are IP Spoofing , IP Hijacking and Smurfing.
Falsification of IP address is called IP Spoofing
Impersonation of legitimate users IP Address is IP Hijacking
Paralysation of a network by sending huge number of ICMP Requests is
called Smurf Attacking
10. TRANSPORT LAYER ATTACKS
Malicious activity in transport layer is mainly TCP and UDP Attacks.
TCP attacks include TCP flooding attacks and sequence number prediction
attacks is a DoS attack in the transport layer.
TCP Flooding is due to sending huge number of Ping requests.
UDP Flooding is due to launching over whelming number of UDP packets.
11. APPLICATION LAYER ATTACKS
The application layer supports HTTP for web services, FTP for file
transfer and SMTP for e-mail transmission.
application-layer attacks may hence be classified as HTTP attacks, FTP
attacks, and SMTP attacks
The main HTTP attacks include the malware attack (e.g., Trojan horse,
viruses, worms, backdoors, key loggers, etc.)
13. BLUETOOTH
Bluetooth is a short-range and low-power wireless networking standard
The authentication represents the process of verifying the identity of
Bluetooth devices based on the BD_ADDR
Both the verifier and claimant perform the same authentication function
using the random number AU RANDA
the link key to obtain their responses denoted by SRES’ and SRES
15. WIFI
The family of Wi-Fi networks mainly based on the IEEE 802.11
The most common security protocols in Wi-Fi are referred to as WEP and
WPA
The WEP protocol consists of two main parts, namely the authentication
part and encryption part. preventing unauthorized access without an
appropriate WEP key
The main advantage of WPA over WEP is that WPA employs more
powerful data encryption
18. LONG TERM EVOLUTION
LTE is the most recent standard developed by the 3G partnership project for
next-generation mobile networks
Its also the dominant technology used for 4G and upcoming 5G Technology
An LTE network typically consists of an EPC and an E-UTRAN
The EPC comprises an MME, a serving gateway, a packet data network
gateway (PDN GW), and an HSS
The E-UTRAN includes a base station (also termed as eNodeB in LTE) and
several UE
20. UPCOMING TRENDS
This section presents a range of challenging open issues and future
directions for wireless security research
Mixed Attacks in Wireless Networks
Joint Optimization of Security, Reliability, and Throughput
Cross-Layer Wireless Security Design and Analysis
Physical-Layer Security for the Emerging 5G Systems
21. Mixed Attacks in Wireless Networks
Most of the physical-layer security research only addressed the
eavesdropping attacks
The joint consideration of different types of wireless attacks, such as
eavesdropping and DoS attacks
It will be of particularly importance to explore new techniques of jointly
defending against multiple types of wireless attacks, which may be termed
as Mixed wireless attacks
22. JOINT OPTIMISATION
Security, reliability, and throughput constitute the main driving factors for
the research and development of wireless networks
It is necessary to investigate the joint optimization of security, reliability,
and throughput
It helps maintaining secure, reliable, and high-rate wireless
communications, which is an open challenge to be solved in the future.
23. Cross-Layer Wireless Security
Presently, cross-layer-aided security design is in its infancy.
The goal of wireless cross-layer-aided security design is to enable efficient
information exchange among different protocol layers for the sake of
improving the level of wireless security with minimal network overhead
In Conventional OSI Each layer separately protected adding complexity
and latency
It will be of high interest to explore the benefits of cross-layer-aided
wireless security for added efficiency against multiple attacks.
24. Physical-Layer Security for the Emerging 5G Systems
Mobile traffic has substantially grown in recent years and it may soon
exceed the capacity of the operational fourth-generation (4G)
It is expected that a strict security requirement is desired for the 5G systems
Physical-layer security as a beneficial complement to conventional security
mechanisms will have a great potential in the context of 5G systems.
It is of high importance to explore the opportunities and challenges of
combining the physical-layer security techniques with 5G
25. CONCLUSION
Survey of the wireless security challenges and defence mechanisms
conceived for protecting the authenticity, confidentiality, integrity, and
availability of wireless transmissions against malicious attacks
Discussed modern and conventional threats and vulnerabilities faced in
wireless communication
Discussed about popular wireless communication methods and safety
measures
Discussed about modern wireless technologies and modern trends in
wireless security
26. REFERENCES
A Survey on Wireless Security: Technical Challenges, RecentAdvances, and Future
Trends by Yulong Zou, Senior Member IEEE, Jia Zhu, Xianbin Wang, Senior Member
IEEE, and Lajos Hanzo, Fellow IEEE
O. Aliu, A. Imran, M. Imran, and B. Evans, “A survey of self-organisation in future
cellular networks,” IEEE Commune. Survey. Tut. vol. 15, no. 1, pp. 336–361, Feb. 2013.
C. Elliott, “Quantum cryptography,” IEEE Security Privacy, vol. 2, no. 4, pp. 57–61, Apr.
2004.
G. Raju and R. Akbani, “Authentication in wireless networks,” in Proc. 40th
Annu.Hawaii Int. Conf. Syst. Sci.,Waikoloa, HI,USA,
W. Stalling, Cryptography and Network Security: Principles and Practices, 3rd Ed.
Englewood Cliffs, NJ, USA: Prentice-Hall, Jan. 2010.