Implementing Privacy and Security To Wireless Networks
Implementing Privacy and Security To Wireless Networks
ABSTRACT
Inherently, wireless networks are more prone to attack than their wired counterparts. Additionally, problems are
created by node mobility and changeable network topology. Additionally, intermittent connectivity whether
brought on by node sleep or mobility presents new difficulties. Direct adoption of current security solutions is
additionally made challenging, if not impossible, by node resource limitations. The areas of wireless networks
and mobile computing are examined in Wireless Communication Network Security and Privacy. Authentication,
access control and authorization, nonrepudiation, privacy and confidentiality, integrity, and auditing are all part
of the security components. Any good or service must include privacy as a feature.
Bluetooth Attack
Bluetooth uses the stream cypher E0 for data
encryption and SAFER+ (Gehrmann&Smeets,
2004) for entity authentication and key
establishment. An attacker can gain the 48-bit
Bluetooth address and then trace the device by
listening in on a Bluetooth exchange or by
contacting a device that is in discoverable mode.
Since the 48-bit address is known to be not random
(the manufacturer-specific 24 bits are reserved for
specific devices, and some manufacturers preserve
specific ranges for specific devices), even if a
device is in non-discoverable mode, it may still be Wireless communication networks' security
discovered. Recovering an address can take issuesThis section will provide a summary of some
anywhere from a few hours to several years, of the key issues that have been raised in relation to
depending on the attacker's information and the wireless communication network security, privacy,
quantity of devices used in the attack and targeted and attack strategies.
at once.
Devices with Bluetooth functionality could be Examples of Different Challenges
subject to denial-of-service attacks. Rogue devices The difficulties of managing wireless security: As
may continually try to connect, which could WLANs become a commonplace part of enterprise
shorten the victim's battery life (Anand, 2003). As network infrastructure, security and management
an illustration, the Bluesnarf attack enables issues become of utmost importance to businesses.
connection to some mobile devices and gives (Laeeq, 2011).
access to the phone's calendar, IMEI (International Wireless LANs (WLANs) have developed to the
Mobile Equipment Identity), and other restricted point that they are being integrated into corporate
networks as standard equipment, posing the biggest is difficult for end users who lack the
wireless pain points for network managers. In order knowledge or server access necessary to set up
for the connectivity, they provide to be as SSH tunnels or their own VPN tunnel.
dependable as that provided by wired Ethernet Problems with Wireless Remote Monitoring:
switches, wireless APs and controllers must be Although employing wireless for remote
controlled and monitored similarly (Sethi, K., monitoring has several financial advantages,
&Jaiswal, V. 2022). business has been sluggish to adopt the technology.
Before wireless measuring systems are widely
The biggest error businesses make while setting
used, there are a number of obstacles that must be
up wireless networks: The worst error made while
removed, including those related to security,
implementing wireless networks is not paying
dependability, integration, and power.
enough attention to and preparing for capacity and
Security and Reliability: For many engineers
application performance needs. Many best-effort
and scientists contemplating wireless, security is
WLANs in use today managed without it, and there
their top worry. The justification for this is mostly
is a strong temptation to deploy next-generation
attributable to the shortcomings of early wireless
WLANs using the same stale guidelines and
protocols like wired equivalent privacy (WEP),
educated guessing.
which did not effectively block unauthorized
New wireless security gadgets: As standards access. Adaptation to Current Systems: Proprietary
have become more established, wireless security networking protocols have been used frequently to
updates have stalled. The current focus of wireless address wireless security flaws:
security technologies is on expanding the visibility • If such a protocol's specifics are ever disclosed,
and applicability of existing controls while the entire system is put at risk.
improving their performance in harsher situations. • Integrating proprietary networks into wired
Security issues with open wireless networks: A systems that are already in place is challenging.
shared wireless network poses two major security If you opt for a proprietary protocol, you are
issues. The absence of a reliable trust network forced to use network components from a single
between the owner of the wireless network node supplier, some of which might not be
and the network user effectively causes both of compatible with your current hardware.
these problems(Sreedhar&Kasiviswanath, 2010).
Battery life:Although it depends on the
The chance that someone will use your network for application, power is a third possible issue for
immoral (or maybe even criminal) purposes, such wireless networks. For instance, Wi-Fi uses more
as accessing immoral content online or trying to power than ZigBee but can broadcast waveform
gain access to personal information through the data continuously. On the other hand, ZigBee and
local network (Sethi, K., &Jaiswal, V. (2019). 802.15.4 can operate for years on batteries thanks
to restrictions on the volume of data they gather
The risk brought on by the requirement to put your and the frequency at which they broadcast it.
trust in the owner of whichever Access Point you
happen to connect to while away from home, as Challenges associated with convergence: The
well as the potential for misuse of that trust to gain wireless revolution depends on the fusion of
access to your personal information and try to steal numerous information and communication
passwords to services like email or online banking. technologies. The transition to more heterogeneous
systems entails the integration of several gadgets,
When one shares their network, there is a many of which demand varying amounts of
chance that users will not utilize it responsibly due bandwidth, such as computers, sensors,
to the potential of connectivity abuse. This risk transmitters, radar, GPS, and cameras. (Abu-
consists of: Rgheff, 2007).
• The risk of abuse of bandwidth:It is usually
done with the implicit idea that you are sharing
surplus bandwidth, i.e., that you probably won't FUTURE RESEARCH DIRECTIONS
notice the difference, when you agree to share However, creating an effective detection
your network with others. mechanism for such a system represents a
(Sreedhar&Kasiviswanath, 2010). significant scientific problem. Although security
• VPN’s and Tunneling: Using a VPN solution
procedures for each layer will eventually become survey of outing attacks and security
well-established, merging all the techniques to have measures in mobile ad-hoc networks.
them cooperate with one another will be a difficult Journal of Computing, 3(1).
research task. Even if wireless sensor networks'
[3]. Ahmad. (2005). Wireless and mobile
overall security could be guaranteed, the cost- data. London:Wiley.
effectiveness and energy efficiency of using such
technologies could present a significant research [4]. Al-Omari &Sumari. (2010). An overview
issue in the future (Agrawal & Sharma, 2011). of mobile ad hoc networks for the
existing protocols and applications.
[23]. Prttig, Szewczyk, Tygar, Wen, & [34]. Sethi, K., &Jaiswal, V. (2022).
Culler. (2002). SPINS: Security protocols PSU-CNN: Prediction of student
for sensor networks, wireless networks. understanding in the classroom through
Dordrecht, The Netherlands: Kluwer student facial images using convolutional
Academic Publishers.. neural network. Materials Today:
Proceedings.
[24]. Schwartz. (2005). Mobile
wireless communications. Cambridge,
UK: Cambridge University Press..
[25]. Sen. (2009). A survey on wireless
sensor network security. International
Journal of Communication Networks and
Information Security, 1(2), 55-78.