IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 5    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 5, May 2011 Edition
Security Challenges & Preventions in Wireless Communications
Full Text(PDF, 3000)  PP.  
Author(s)
Kashif Laeeq
KEYWORDS
Attack, Denial of service, Mobile Ad-hoc Networks, Security issues, Vulnerabilities, Wireless Communication, WSN
ABSTRACT
Without the need of an infrastructure, low-cost, auto-managed, flexible and low power consumer, wireless communication is becoming emerging technology. It shows great binder for present as well as future hi-tech applications. Increasing reliance on wireless communication also brings great challenges to the security measures and other correlated issues. Although the newly introduced corrected security standard, IEEE 802.11i, offers extensive security for the wireless environment but it is still premature and does not provide effective measures to protect the wireless networks from confidentiality and integrity threats. The main issues for deployment of wireless networks are security attacks, vulnerabilities, battery power and improper security models. This paper provides a study on these problems especially in ad-hoc wireless networks. The study is based on numerous proposed schemes in the endeavor to secure such networks. The goal of this paper is to probe the principal security issues, challenges and fundamental security require-ments of wireless communications on the bases of their proposed solutions.
References
[1] Kumar, R. Valdez, O.Gomez ,S.Bose: “Survivability evaluation of wireless sensor network under DDoS attacks”IEEE International Conference on Systems and Mobile Communications and Learning Technologies,2006 pp.82-82

[2] Tanveer A Zia and Md Zahidul Islam: “Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks:” IEEE, International Conference on Availability, Reliability and Security, ARES '10 International Conference on, 2010 pp. 347-352

[3] H.R. Zeilandoo, M.A. Ngadi: “Intruder Location Tracking” second international conference on computer and electirical engineering, DO110.1109/ICCEE.2009.53, 2009 pp.507-511

[4] Xinyu Xing; Shakshuki, E.; Benoit, D.; Sheltami, T: “Security Analysis and Authentication Improvement for IEEE 802.11i Specification” IEEE lobal Telecommunications Conference, 2008. IEEE GLOBECOM 2008. pp. 1-5

[5] Boudriga, N.; Baghdadi, M.; Obaidat, M.S: “A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks”IEEE 39th Annual Simulation Symposium, November Digital Object Identifier: 10.1109/ANSS.2006.8, 2006.

[6] Todd Kennedy, Ray Hunt, Christchurch: “A Review of WPAN Security Attacks and Prevention” the International Conference on Mobile …, 2008 - portal.acm.org

[7] Chi Yoon Jeong, Beom Hwan Chang and Jung Chan Na:, “A Survey on Visualization for Wireless Security” Networked Computing and Advanced Information Management, 2008. NCM '08. Fourth International Conference Volume: 1 , 2008.pp. 129-132

[8] Neel Diksha, Agarwal Shubham: “Backdoor Intrusion in Wireless Networks-Problems and Solutions” Communication Technology, 2006. ICCT '06. International Conference 2006 pp. 1-4

[9] Binod Vaidya, SangDuck Lee, Jongan Park: “Evaluation of Secure Multimedia Services over Wireless Access Network”, Ubiquitous Multimedia Computing, 2008. UMC '08. International Symposium , May 2008 pp. 181-184

[10] Hassen Redwan and Ki-Hyung Kim: “Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks” Frontier of Computer Science and Technology, 2008. FCST '08. Japan-China Joint Workshop , 2008 pp. 3-9

[11] Sarijari, M.A.B.; Rashid, R.A.; Rahim, M.R.A.; Mahalin, N.H: “Wireless Home Security and Automation System Utilizing ZigBee based Multi-hop Communication”Proceedings of IEEE 2008 6th National Conference on Telecommunication Technologies, August 2008 pp. 242-245.

[12] Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong: “Security in Wireless Sensor Networks: Issues and Challenges” Advanced Communication Technology, 2006. ICACT 2006. The 8th International ConferenceVolume: 2 , Feb 2006 pp. 1048

[13] Ashraf, A.; Rauf, A.; Mussadiq, M.; Chowdhry, B.S.; Hashmani, M: “A Model for Classifying Threats and Framework Association in Wireless Sensor Networks” Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference pp. 7-9

[14] Slijepcevic, S.; Potkonjak, M.; Tsiatsis, V.; Zimbeck, S.; Srivastava, M.B: “On Communication Security in Wireless Ad-Hoc Sensor Networks” Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops,2002 PP.139-144

[15] Xi Peng; Zheng Wu; Debao Xiao; Yang Yu:“Study on Security Management Architecture for Sensor Network based on Intrusion Detection” Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on Networks Security, Wireless Communications & Trusted Computing,Vol. 2, 2009 pp. 503-507

[16] Lionel Besson, Philippe Leleu, Colombes Cedex France: “A Distributed Intrusion Detection System for Ad-Hoc Wireless Sensor Networks”, Systems, Signals and Image Processing, IWSSIP 2009. 16th International Conference, 2009 pp.1-3

[17] Alia Fourati, Khaldoun Al Agha: “An IDS First Line of Defense for Ad-Hoc Networks”, Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE pp. 2619-2624

[18] Shahid Shehzad Bajwa, M. Khalid Khan:“Grouped Black hole Attacks Security Model(GBHASM) for Wireless Ad-Hoc Networks” Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference Vol.1 , 2010 pp. 756-760

[19] Gunhee Lee, Dong-Kyoo Kim, Jungtack Seo: ” An Approach to Mitigate Wormhole Attack in Wireless Ad-Hoc Networks” Information Security and Assurance, 2008. ISA 2008. International Conference , 2008 pp. 220-225

[20] S Yi, P Naldurg, R Kravets - Urbana – Citeseer:” A Security- Aware Routing Protocol for Wireless Ad-Hoc Networks”

Untitled Page