IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 4    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 4, April 2011 Edition
Survey of Current and Future Trends in Security in Wireless Networks
Full Text(PDF, 3000)  PP.  
Author(s)
Vikas Solomon Abel
KEYWORDS
Bluetooth, Wi-Fi, WiMax, Wireless Sensors, WLAN
ABSTRACT
Security has always been a key issue with all the wireless networks since they have no physical boundaries. Many existing and evolving threats which must be considered to ensure the countermeasures are able to meet the security requirements of the environments for which it is expected to be deployed.
References
[1] S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose and D. Towsley, “Facilitating Access Point selection in IEEE 802.11 wireless networks” , Proceedings of 5th ACM Conference on Internet Measurement, 2005.

[2] S. Khan, K.Loo, T. Naeem, M. Hhan, “ Denial of Service Attacks and Challenges in Broadband Wireless Networks ”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 2008.

[3] V. Gunasekaran, F. Harmantzis, “Emerging wireless technologies for developing countries ”, Technology in Society 29 23–42, 2009.

[4] C. Karlof and D.Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures”, Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003.

[5] J. Haartsen, “BLUETOOTH—“The universal radio interface for ad hoc, wireless connectivity” , Ericsson Review No. 3, 1998.

[6] A. Pirzada, C. McDonald, “Establishing trust in pure ad-hoc networks”, in: CRPIT ’04: Proceedings of the 27th Conference on Australasian Computer Science, Australian Computer Society Inc., Darlinghurst, Australia, 2004, pp. 47–54.

[7] H. Kim, Department of Electrical and Computer Engineering, Stevens Institute of Technology, “IEEE 802.16/WiMAX Security”, 2006.

[8] M. Bogdanoski, P. Latkoski, A. Risteski, Borislav Popovsk, “IEEE 802.16 Security Issues: A Survey”, 16th Telecommunication forum, TELFOR 2008.

[9] H Yang, H Luo, F Ye, S Lu, L Zhang , “Security in mobile ad hoc networks: challenges and solutions”, IEEE Wireless Communications, 2004 – Citeseer.

[10] C. Perkins and E Royer, “Ad Hoc On-Demand Distance Vector Routing,”, 2nd IEEE Wksp. Mobile Comp. Sys. and Apps., 1999.

[11] D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski and H. Korth, Ed., Kluwer, 1996.

[12] Y. Hu, A. Perrig, and D. Johnson, “Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks”, ACM MOBICOM, 2002.

[13] M. Zapata, and N. Asokan, “Securing Ad Hoc Routing Protocols,” ACM WiSe, 2002.

[14] S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon ,K. Nygard , “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks” , In Proceedings of the International Conference onWireless Networks, Las Vegas, June 2003.

[15] Ebrahim Mohammed Louis Dargin,Oakland University School of Computer Science and Engineering CSE 681 Information Security, “Routing Protocols Security in Ad Hoc Networks”, Citeseer.

[16] L. Hu, D. Evans, Department of Computer Science , University of Virginia Charlottesville, “ Using Directional Antennas to Prevent Wormhole Attacks”, Network and Distributed System Security Symposium (NDSS), February 2004.

[17] S. Khan, K.Loo, T. Naeem, M. Khan , “Denial of Service Attacks and Challenges in Broadband Wireless Networks”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 2008.

[18] V. Palanisamy, P.Annadurai, “Impact of Rushing attack on Multicast in Mobile Ad Hoc Network” , (IJCSIS) International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009.

[19] A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks”, IEEE Computer, vol. 35, no. 10, pp. 54–62, 2002.

[20] Y. Wang, G. Atterbury, B. Ramamurthy, “A survey of security issues in wireless sensor networks”, IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, 2006.

[21] R. Mylavarapu, “Security considerations for WiMAX- based converged network”, http://rfdesign.com, August 2005.

[22] V. Abel, “Survey of Attacks on Mobile Adhoc Wireless Networks”, International Journal on Computer Science and Engineering, ISSN : 0975-3397, Vol. 3 No. 2, 2 Feb 2011.

[23] V. Abel, A. Mnaouer, “On the Study of the WiMAX Security Threats and Current Solution Trends”, Journal of the Caribbean Academy of Sciences, 2010. 249

Untitled Page