To read this content please select one of the options below:

Please note you do not have access to teaching notes, literature review on network security in wireless mobile ad-hoc network for iot applications: network attacks and detection mechanisms.

International Journal of Intelligent Unmanned Systems

ISSN : 2049-6427

Article publication date: 21 September 2021

Issue publication date: 22 November 2022

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.

Design/methodology/approach

This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.

It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.

Originality/value

This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.

  • Network security
  • Wireless sensor network
  • Mobile ad-hoc network
  • IoT applications
  • Network attacks
  • Intrusion detection system

Acknowledgements

The author would like to thank R. Narmadha for her support and constructive suggestions during the planning and development of this research work and would like to express appreciation for her willingness to give her valuable time. Also the author wishes to thank the author’s family for their support and encouragement throughout this work.

Funding : None.

Pamarthi, S. and Narmadha, R. (2022), "Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms", International Journal of Intelligent Unmanned Systems , Vol. 10 No. 4, pp. 482-506. https://doi.org/10.1108/IJIUS-05-2021-0028

Emerald Publishing Limited

Copyright © 2021, Emerald Publishing Limited

Related articles

All feedback is valuable.

Please share your general feedback

Report an issue or find answers to frequently asked questions

Contact Customer Support

Help | Advanced Search

Computer Science > Cryptography and Security

Title: a systematic literature review on 5g security.

Abstract: It is expected that the creation of next-generation wireless networks would result in the availability of high-speed and low-latency connectivity for every part of our life. As a result, it is important that the network is secure. The network's security environment has grown more complicated as a result of the growing number of devices and the diversity of services that 5G will provide. This is why it is important that the development of effective security solutions is carried out early. Our findings of this review have revealed the various directions that will be pursued in the development of next-generation wireless networks. Some of these include the use of Artificial Intelligence and Software Defined Mobile Networks. The threat environment for 5G networks, security weaknesses in the new technology paradigms that 5G will embrace, and provided solutions presented in the key studies in the field of 5G cyber security are all described in this systematic literature review for prospective researchers. Future research directions to protect wireless networks beyond 5G are also covered.
Subjects: Cryptography and Security (cs.CR)
Cite as: [cs.CR]
  (or [cs.CR] for this version)
  Focus to learn more arXiv-issued DOI via DataCite

Submission history

Access paper:.

  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

  • DOI: 10.1108/ijius-05-2021-0028
  • Corpus ID: 239302265

Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms

  • Satyanarayana Pamarthi , R. Narmadha
  • Published in International Journal of… 21 September 2021
  • Computer Science, Engineering, Environmental Science

21 Citations

Adaptive secure and efficient routing protocol for enhance the performance of mobile ad hoc network, applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: a systematic literature review, detection system using random x-layer mobility with qch algorithm in wireless ad-hoc networks, enhancement of energy efficiency and network lifetime using modified cluster based routing in wireless sensor networks, intelligent privacy preservation proctol in wireless manet for iot applications using hybrid crow search-harris hawks optimization, fl-ids: federated learning-based intrusion detection system using edge devices for transportation iot, a deep learning-based intrusion detection approach for mobile ad-hoc network.

  • Highly Influenced

Performance Analysis of Modified Position Responsive Routing Protocol (MPRRP) to Improve QoS in Wireless Sensor Networks

Empirical analysis of developing ec based algorithms for various wsn network applications, implementation of improved energy balanced routing protocol to enlarge energy efficiency in manet for iot applications, 73 references, sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot, a novel approach for efficient usage of intrusion detection system in mobile ad hoc networks, a survey on intrusion detection and prevention in wireless ad-hoc networks, eaack—a secure intrusion-detection system for manets, svelte: real-time intrusion detection in the internet of things, modeling the internet of things under attack: a g-network approach, sensor network security: a survey, a ddos attack detection and mitigation with software-defined internet of things framework, a supervised intrusion detection system for smart home iot devices, intrusion detection in mobile ad-hoc network using hybrid reactive search and bat algorithm, related papers.

Showing 1 through 3 of 0 Related Papers

Analysis of Attacks and Security Requirements for Wireless Body Area Networks - A Systematic Literature Review

  • Conference paper
  • First Online: 22 August 2019
  • Cite this conference paper

literature review on wireless network security

  • Pangkaj Chandra Paul 10 ,
  • John Loane   ORCID: orcid.org/0000-0002-9285-5019 10 ,
  • Gilbert Regan 10 &
  • Fergal McCaffery 10  

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1060))

Included in the following conference series:

  • European Conference on Software Process Improvement

3660 Accesses

8 Citations

Wireless Body Area Networks are gaining popularity in healthcare applications due to recent advances in sensor technology, integrated circuits, and wireless communication. These systems need to ensure that data is protected during collection, transmission, processing and storage. Currently, no complete solution exists for ensuring data is protected while also meeting regulatory security requirements for wireless body area network applications. To develop effective solutions, it is necessary to explore the attacks and security requirements of wireless body area network applications. There is no comprehensive list of attacks and security requirements. This paper will present a systematic literature review of potential attacks and security requirements for ensuring data security in wireless body area networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

literature review on wireless network security

Security Challenges and Solutions for Wireless Body Area Networks

literature review on wireless network security

General Outlook of Wireless Body Area Sensor Networks

literature review on wireless network security

A Review: Security and Privacy for Health Care Application in Wireless Body Area Networks

IEEE802.15.6: IEEE Standard for Local and Metropolitan Area Networks - Part 15.6: Wireless Body Area Networks. (2012)

Google Scholar  

Bouazizi, A., Zaibi, G., Samet, M., Kachouri, A.: Wireless body area network for e-health applications: overview. In: International Conference on SM2C, pp. 17–19 (2017)

Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17 , 51–58 (2010)

Article   Google Scholar  

Siva Bharathi, K.R., Venkateswari, R.: Security challenges and solutions for wireless body area networks. In: Iyer, B., Nalbalwar, S.L., Pathak, N.P. (eds.) Computing, Communication and Signal Processing. AISC, vol. 810, pp. 275–283. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-1513-8_29

Chapter   Google Scholar  

Zou, S., Xu, Y., Wang, H., Li, Z., Chen, S., Hu, B.: A survey on secure wireless body area networks. Secur. Commun. Netw. 2017 , 9 (2017)

Kompara, M., Hölbl, M.: Survey on security in intra-body area network communication. Ad Hoc Netw. 70 , 23–43 (2018)

Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., Shamshirband, S.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Inform. J. 18 , 113–122 (2017)

Sajid, A., Abbas, H.: Data privacy in cloud-assisted healthcare systems: state of the art and future challenges. J. Med. Syst. 40 , 155 (2016)

Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering. Engineering. 45 , 1051 (2007)

Kotz, D.: A threat taxonomy for mHealth privacy. In: 3rd International Conference on Communication Systems and Networks, COMSNETS (2011)

Partala, J., et al.: Security threats against the transmission chain of a medical health monitoring system. In: 15th International Conference on e-Health Networking, Applications and Services, pp. 243–248 (2013)

Omoogun, M., Seeam, P., Ramsurrun, V., Bellekens, X., Seeam, A.: When eHealth meets the internet of things: pervasive security and privacy challenges. In: 2017 International Conference on Cyber Security and Protection of Digital Services (2017)

Dhillon, P.K., Kalra, S.: Multi-factor user authentication scheme for IoT-based healthcare services. J. Reliab. Intell. Environ. 43 , 141–160 (2018)

Islam, S.M.R., Kwak, D., Kabir, H., Hossain, M., Kwak, K.-S.: The internet of things for health care: a comprehensive survey. IEEE Access 3 , 678–708 (2015)

Dimitriou, T., Ioannis, K.: Security issues in biomedical wireless sensor networks. In: 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies, pp. 1–5 (2008)

Wazid, M., Das, A.K., Kumar, N., Conti, M., Vasilakos, A.V.: A novel authentication and key agreement scheme for implantable medical devices deployment. IEEE J. Biomed. Health Inform. 22 , 1299–1309 (2017)

Prakash, S., Mamta: An overview of healthcare perspective based security issues in wireless sensor networks. In: Computing for Sustainable Global Development, pp. 870–875 (2016)

Saleem, S., Ullah, S., Kwak, K.S.: Towards security issues and solutions in wireless body area networks. In: 6th International Conference on Networked Computing, pp. 1–4 (2010)

Mainanwal, V., Gupta, M., Upadhayay, S.K.: A survey on wireless body area network: security technology and its design methodology issue. In: 2015 International Conference on Innovations in Information, Embedded and Communication Systems, pp. 1–5 (2015)

Liu, J.: Hybrid security mechanisms for wireless body area networks. In: Second International Conference on Ubiquitous and Future Networks (ICUFN), pp. 98–103 (2010)

Al Alkeem, E., Yeun, C.Y., Zemerly, M.J.: Security and privacy framework for ubiquitous healthcare IoT devices. In: 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, pp. 70–75 (2016)

Zhang, Z., Zhou, H.: A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains. In: Proceedings - 2011 12th ACIS 2th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2011, pp. 33–37 (2011)

Rahman, A.F.A., Ahmad, R., Ramli, S.N.: Forensics readiness for Wireless Body Area Network (WBAN) system. In: International Conference on Advanced Communication Technology, ICACT, pp. 177–180 (2014)

Latif, R., Abbas, H., Assar, S.: Distributed Denial of Service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review. J. Med. Syst. 38 , 128 (2014)

Ragesh, G.K., Baskaran, K.: CRYPE: towards cryptographically enforced and privacy enhanced WBANs. In: Proceedings of the First International Conference on Security of Internet of Things, pp. 204–209. ACM, New York (2012)

Hosseini-Khayat, S.: A lightweight security protocol for ultra-low power ASIC implementation for wireless implantable medical devices. In: 2011 5th International Symposium on Medical Information and Communication Technology, ISMICT 2011, pp. 6–9 (2011)

Seneviratne, S., et al.: A survey of wearable devices and challenges. IEEE Commun. Surv. Tutor. 19 , 2573–2620 (2017)

Alsadhan, A., Khan, N.: An LBP based key management for secure wireless body area network (WBAN). In: 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 85–88 (2013)

Langone, M., Setola, R., Lopez, J.: Cybersecurity of wearable devices: an experimental analysis and a vulnerability assessment method. In: 2017 IEEE 41st Annual Computer Software and Applications Conference, pp. 304–309 (2017)

Thamilarasu, G., Odesile, A.: Securing wireless body area networks: challenges, review and recommendations. In: IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–7 (2017)

Dodangeh, P., Jahangir, A.H.: A biometric security scheme for wireless body area networks. J. Inf. Secur. Appl. 41 , 62–74 (2018)

Kyaw, A.K., Cusack, B.: Security challenges in pervasive wireless medical systems and devices. In: 2014 11th Annual High Capacity Optical Networks Emerging/Enabling Technologies (Photonics Energy), HONET-PfE 2014, pp. 178–185 (2014)

Antonescu, B., Basagni, S.: Wireless body area networks: challenges, trends and emerging technologies. In: 8th International Conference on Body Area Networks, pp. 1–7 (2013)

Zeadally, S., Isaac, J.T., Baig, Z.: Security attacks and solutions in electronic health (e-health) systems. J. Med. Syst. 40 , 263 (2016)

Challa, S., Wazid, M., Das, A.K., Khan, M.K.: Authentication protocols for implantable medical devices: taxonomy, analysis and future directions. IEEE Consum. Electron. Mag. 7 , 57–65 (2018)

Jang, C., Lee, D.-G., Han, J.: A proposal of security framework for wireless body area network. In: 2008 International Conference on Security Technology, pp. 202–205 (2008)

Javadi, S.S., Razzaque, M.A.: Security and privacy in wireless body area networks for health care applications. Wirel. Netw. Secur. 26 , 165–187 (2013)

Al Ameen, M., Liu, J.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36 , 93–101 (2012)

Ankarali, Z.E., Abbasi, Q.H., Demir, A.F., Serpedin, E., Qaraqe, K., Arslan, H.: A comparative review on the wireless implantable medical devices privacy and security. In: 4th International Conference on Wireless Mobile Communication and Healthcare, pp. 246–249 (2014)

Huang, C., Lee, H., Hoon, D.: A privacy-strengthened scheme for e-healthcare monitoring system. J. Med. Syst. 36 , 2959–2971 (2012)

Razzi, S.M., Lee, H., Lee, S., Lee, Y.K.: BARI: a biometric based distributed key management approach for wireless body area networks. Sensors 10 , 3911–3933 (2009)

Miao, F., Jiang, L., Li, Y., Zhang, Y.T.: A novel biometrics based security solution for body sensor networks. In: 2009 2nd International Conference on Biomedical Engineering and Informatics, BMEI (2009)

Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E.C.: A lightweight policy system for body sensor networks. IEEE Trans. Netw. Serv. Manag. 6 , 137–148 (2009)

Amini, S., Verhoeven, R., Lukkien, J., Chen, S.: Toward a security model for a body sensor platform. In: Digest of Technical Papers - IEEE International Conference on Consumer Electronics, pp. 143–144 (2011)

Kumar, P., Lee, S.G., Lee, H.J.: A user authentication for healthcare application using wireless medical sensor networks. In: IEEE International Conference on HPCC, vol. 1, pp. 647–652 (2011)

Wu, L., Zhang, Y., Li, L., Shen, J.: Efficient and anonymous authentication scheme for wireless body area networks. J. Med. Syst. 40 , 136 (2016)

Ullah, S., Alamri, A.: A secure RFID-based WBAN for healthcare applications. J. Med. Syst. 37 , 9961 (2013)

Zhu, Y., Sloman, M., Lupu, E., Loong Keoh, S.: Vesta: a secure and autonomic system for pervasive healthcare. In: 3rd International Conference on Pervasive Computing Technologies for Healthcare (2009)

Ramli, S.N., Ahmad, R.: Surveying the wireless body area network in the realm of wireless communication. In: 7th International Conference on Information Assurance and Security, IAS 2011, pp. 58–61 (2011)

Naik, M.R.K., Samundiswary, P.: Wireless body area network security issues—Survey. In: International Conference on Control, Instrumentation, Communication and Computational Technologies, pp. 190–194 (2016)

Sawaneh, I.A., Sankoh, I., Koroma, D.K.: A survey on security issues and wearable sensors in wireless body area network for healthcare system. In: Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 304–308 (2017)

He, D., Zeadally, S., Kumar, N., Lee, J.-H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11 , 2590–2601 (2017)

Cavallari, R., Martelli, F., Rosini, R., Buratti, C., Verdone, R.: A survey on wireless body area networks: technologies and design challenges. IEEE Commun. Surv. Tutor. PP , 1–23 (2014)

Venkatasubramanian, S., Jothi, V.: Integrated authentication and security check with CDMA modulation technique in physical layer of Wireless Body Area Network. In: 2012 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2012 (2012)

Yin, L., Zhang, A., Ye, X., Wang, L.: Security-aware attribute-based access control for fog-based eldercare system. In: International Conference on Computer and Communications (ICCC), pp. 2680–2684 (2017)

Li, F., Hong, J.: Efficient certificateless access control for wireless body area networks. IEEE Sens. J. 16 , 5389–5396 (2016)

Alshamsi, A.Z., Barka, E.S., Serhani, M.A.: Lightweight encryption algorithm in wireless body area network for e-health monitoring. In: 2016 12th International Conference on Innovations in Information Technology (IIT), pp. 1–7 (2016)

Sindhu, K.V.: Trustworthy access control for wireless body area networks. In: International Conference on Information Communication and Embedded Systems (ICICES), pp. 1–5 (2017)

Fragopoulos, A.G., Gialelis, J., Serpanos, D.: Imposing holistic privacy and data security on person centric eHealth monitoring infrastructures. In: 12th IEEE International Conference on e-Health Networking, Applications and Services (2010)

Saleem, K., et al.: Survey on cybersecurity issues in wireless mesh networks based eHealthcare. In: IEEE 18th International Conference on e-Health Networking, Applications and Services (2016)

Chukwunonyerem, J., Aibinu, A.M., Onwuka, E.N.: Review on security of wireless body area sensor network. In: 11th International Conference on Electronics, Computer and Computation (ICECCO), pp. 1–10 (2014)

Saarika, U., Sharma, P.K., Sharma, D.: A roadmap to the realization of wireless body area networks: a review. In: International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 439–443 (2016)

Ara, A., Al-Rodhaan, M., Tian, Y., Al-Dhelaan, A.: A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems. IEEE Access 5 , 12601–12617 (2017)

Alemdar, H., Ersoy, C.: Wireless sensor networks for healthcare: a survey. Comput. Netw. 54 , 2688–2710 (2010)

Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y.: Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106 , 117–123 (2018)

Ramu, G.: A secure cloud framework to share EHRs using modified CP-ABE and the attribute bloom filter. Educ. Inf. Technol. 23 , 2213–2233 (2018)

Xu, J., Wei, L., Wu, W., Wang, A., Zhang, Y., Zhou, F.: Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber–physical system. Future Gener. Comput. Syst. (2018). https://www.sciencedirect.com/science/article/pii/S0167739X17326067

Singelée, D., et al.: A secure cross-layer protocol for multi-hop wireless body area networks. In: Coudert, D., Simplot-Ryl, D., Stojmenovic, I. (eds.) ADHOC-NOW 2008. LNCS, vol. 5198, pp. 94–107. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85209-4_8

Dharshini, S., Subashini, M.M.: An overview on wireless body area networks. In: Power and Advanced Computing Technologies (i-PACT), pp. 1–10 (2017)

Masdari, M., Ahmadzadeh, S., Bidaki, M.: Key management in wireless body area network: challenges and issues. J. Netw. Comput. Appl. 91 , 36–51 (2017)

Download references

Acknowledgement

This work was supported with the financial support of the Science Foundation Ireland grant 13/RC/2094. Additionally, this work was partly funded by the DEIS H2020 project (Grant Agreement 732242).

Author information

Authors and affiliations.

Regulated Software Research Centre, Dundalk Institute of Technology, Dundalk, County Louth, Ireland

Pangkaj Chandra Paul, John Loane, Gilbert Regan & Fergal McCaffery

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Pangkaj Chandra Paul .

Editor information

Editors and affiliations.

Lorit Consultancy, Edinburgh, UK

Alastair Walker

School of Computing, Dublin City University, Dublin, Ireland

Rory V. O'Connor

I.S.C.N. GesmbH, Graz, Austria

Richard Messnarz

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Cite this paper.

Paul, P.C., Loane, J., Regan, G., McCaffery, F. (2019). Analysis of Attacks and Security Requirements for Wireless Body Area Networks - A Systematic Literature Review. In: Walker, A., O'Connor, R., Messnarz, R. (eds) Systems, Software and Services Process Improvement. EuroSPI 2019. Communications in Computer and Information Science, vol 1060. Springer, Cham. https://doi.org/10.1007/978-3-030-28005-5_34

Download citation

DOI : https://doi.org/10.1007/978-3-030-28005-5_34

Published : 22 August 2019

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-28004-8

Online ISBN : 978-3-030-28005-5

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

TechRepublic

Wi-fi security: a literature review of security in wireless network.

In this paper, the authors propose wireless networks have broadcast nature so there are different security issues in the wireless communication. The security conventions intended for the wired systems can’t be extrapolated to wireless systems. Hackers and intruders can make utilization of the loopholes of the wireless communication. In this paper, they will mull over the different remote security dangers to wireless systems and conventions at present accessible like Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2). WPA2 is more hearty security convention as compared with WPA on the grounds that it utilizes the Advanced Encryption Standard (AES) encryption.

Subscribe to the Developer Insider Newsletter

From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays

Resource Details

Create a techrepublic account.

Get the web's best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let's start with the basics.

* - indicates required fields

Sign in to TechRepublic

Lost your password? Request a new password

Reset Password

Please enter your email adress. You will receive an email message with instructions on how to reset your password.

Check your email for a password reset link. If you didn't receive an email don't forgot to check your spam folder, otherwise contact support .

Welcome. Tell us a little bit about you.

This will help us provide you with customized content.

Want to receive more TechRepublic news?

You're all set.

Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add [email protected] to your contacts list.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

Profile image of faiza riaz

Impact Factor(JCC): 1.9586-This article can be downloaded from www.impactjournals.us ABSTRACT As we know wireless networks have broadcast nature so there are different security issues in the wireless communication. The security conventions intended for the wired systems can't be extrapolated to wireless systems. Hackers and intruders can make utilization of the loopholes of the wireless communication. In this paper we will mull over the different remote security dangers to wireless systems and conventions at present accessible like Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2). WPA2 is more hearty security convention as compared with WPA on the grounds that it utilizes the Advanced Encryption Standard (AES) encryption. There are few issues in WPA2 like it is helpless against brute force attack and MIC bits could be utilized by programmer to compare it with the decoded content. So in this paper we will concentrate on different sorts of wireless security dangers.

Related Papers

Betre Shiferaw

literature review on wireless network security

Computer Science and …

Puneet Garg

11th Islamic Countries Conference on Statistical Sciences (ICCS-11)

Muhammad Tariq

Wireless Networking technology is now one of the most popular technologies but still there are drawbacks which are closely associated with Wireless Networks. In wireless network communication, the data is transferred from one point to another point through radio waves which makes wireless networks weak for attacks. To eliminate threats, understanding about said attacks always provides good ability to defend wireless network. This research paper will describe the overview of the wireless technology with its drawbacks, Present security and privacy issues, Potential wireless network Security threats (unauthorized access, Active eavesdropping, Man in the Middle Attack, Denial of Service and etc), Tools that hackers often use to exploit vulnerabilities in wireless networking (NetStumbler, Kismet, Airsnort, Airsnarf, Airjack and etc) and will propose the best ways to secure Wireless Network.

Lahore Lead university

Wireless technology has been increasingly popular for some year. Acceptance of wireless network depend on the case of use and level of security. Now day the most of wireless network hold over sensitive information and given access only authorized user. As a result communication network are essential implements some type of security protocol that will restrict users to who have access to network resource. To make sure the network is most secure. Must be network capable implements two concepts data privacy and data integrity. Data privacy is ensuring this when it comes to data integrity all the pocket on network are irreversible or unreadable for any universal force to sure that edited data is corrected. There are three main type of security standard in wireless. In this survey paper we discusses three most well know wireless network protocols also name WEP, WPA and WPA2. We discussed the shape of WEP and WPA, WPA2. Now we try to explain WPA2 version and problem after this to solve the major problem. At the end we make comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology.

International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)

Arash Habibi Lashkari

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

Wireless networks have posed a threat in Data Security that has stuck to the core of data communication between two points. Absence of inflexible security measures has made numerous organizations contribute millions to verify their systems. Development of different security conventions for Wireless LANs has been given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of different tools and programming languages used for testing the strength of the protocols. Tools like nmap, zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has been applied in WPA, similarly WPA2 and WPA3.

Menal Dahiya

In current world everyone wants to communicate without the need of a physical infrastructure, at a low cost, high speed and low power consumption. All these features made the wireless communication technology as a first choice for every individual or by any organization. For a small organization or in home networks WLAN is being widely recommendable solution. It can replace the wired LAN and offers many benefits to the market momentum. Apart from these advantages security is the fundamental aspect where research is going on. WLAN faces many security challenges especially in Wi-Fi networking. The goal of this paper is to discuss the major privacy security issues, attacks, solutions and fundamental security requirements of wireless communication.

International Journal of Engineering Research and Technology (IJERT)

IJERT Journal

https://www.ijert.org/comparative-analysis-wi-fi-security-protocols https://www.ijert.org/research/comparative-analysis-wi-fi-security-protocols-IJERTV2IS121127.pdf In recent years, various wireless LAN technologies have gained rapid popularity and Wi-Fi can be cited as most prominent or proficient technology today. Wi-Fi stands for Wireless Fidelity and it operates in the unlicensed 2.4 GHz radio spectrum, support variable data rates and it is used to define the wireless technology in the IEEE 802.11b standard. Wireless network provides many advantages like mobility, cut costs but it is coupled with many security threats such as replay attack, eaves dropping, denial of services attack etc. The threats of intrusion into the wireless network have forced user to adopt a range of security. This paper presents an analysis of the three security protocols, from the WLANs security requirements point of view. In this paper, we discuss the wireless security protocols with details about the encryption & authentication mechanism used and their limitations.

… of the 1st international conference on …

Kahiro Kirongo

jitendra yadav

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Profesor Madya Dr. Rosli Bin Saleh

A.K.M. Nazmus Sakib

Vincent Nyangaresi

Globalization and Business

Pranit Patil

IRJET Journal

WARSE The World Academy of Research in Science and Engineering

Mandeep Kundhal

International journal of engineering science and technology

Muntasim Munim

Control Theory and Informatics

Joseph Mwangi

Lecture Notes in Computer Science

Eduardo Fernandez

apakatanya apakaubilang

Akhil D Ravichandra

Amir Shehzad

IEEE International Conference on Computing, Communication and Automation (ICCCA2015)

Akhil Gupta , RAKESH JHA

4th Australian Security …

Jemal H Abawajy

Abdullah Ahmed

Konstantinos Chalkias

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Survey on Wireless Network Security

  • Archives of Computational Methods in Engineering 29(1)
  • This person is not on ResearchGate, or hasn't claimed this research yet.

Asif Ali Laghari at Sindh Madressatul Islam University

  • Sindh Madressatul Islam University

Kamlesh Kumar at Sindh Madressatul Islam University

  • Karunya University

Abstract and Figures

Ad hoc mode

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations
  • CELL BIOCHEM BIOPHYS
  • Mehmet Bostancıklıoğlu

Tianyu Zhang

  • U. W. Anthony
  • D. C. Elenwo
  • M. S. Hamza

Danish Gufran

  • Elisa Bertino
  • Suneel Kumar
  • Daniel Camps-Mur

Eduard Garcia-Villegas

  • Nikkath Bushra S.
  • V. Dudykevych
  • Halyna Mykytyn
  • A. Tina Victoria

Dr Kowsigan . M

  • WIRELESS PERS COMMUN
  • Alok Kumar Shukla
  • Jeshua Woon Tien Ming
  • Jia Suan Yap

Fatima Tuz Zahra

  • Cheah Wai Shiang

Farhan Ahmad

  • Pete Burnap

Luca Cerina

  • Rahul Chakravorty
  • Jay Prakash

Ayodeji Salau

  • Tanel Kuusk
  • Xavier Bellekens
  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

IMAGES

  1. (PDF) A Literature Review of Security Threats to Wireless Networks

    literature review on wireless network security

  2. (PDF) Evaluation of Wireless Network Security Using Information System

    literature review on wireless network security

  3. (PDF) Wireless Network Security recommendations Using the Application

    literature review on wireless network security

  4. (PDF) WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS

    literature review on wireless network security

  5. (PDF) ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS

    literature review on wireless network security

  6. (PDF) Wireless Sensor Network Security Challenges and Attacks: A Review

    literature review on wireless network security

VIDEO

  1. Issues and Challenges In Wireless Sensor Networks

  2. E-SPIN Wireless Network Security Assessment Services Overview

  3. Lecture 9 Wireless Network Security ESU

  4. Wireless Network Security

  5. Wireless Sensor Networks an Introduction

  6. Wireless Body Area Networks (WBAN)-3: Research trends and finding research gaps

COMMENTS

  1. (Pdf) Literature Review and Comprehensive Evaluation Security and

    This literature review offers a thorough examination of recent developments in wireless network security and privacy, emphasizing the evolving landscape, including challenges, solutions, and ...

  2. Wireless sensor network security: A recent review based on state-of-the

    Wireless sensor network security is provided on two levels. 16 On the first level, encryption methods and firewalls are utilised to protect the network from outside attackers. Intrusion detection systems (IDS) are employed to defend against internal intruders at the second level. ... We identified several issues and challenges in the literature ...

  3. Wireless Security Protocols WPA3: A Systematic Literature Review

    The size of wireless networks and the number of wireless devices are growing daily. A crucial part of wireless security involves preventing unauthorized access by using wireless security protocols in order to protect the data in wireless networks. In 2018, Wi-Fi Protected Access 3 (WPA3) was ratified to protect the data in devices bearing the Wi-Fi trademark. WPA3 has many security ...

  4. Literature review on network security in Wireless Mobile Ad-hoc Network

    It is essential to shelter the network from attacks over the Internet by keeping the secure router.,This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT ...

  5. (PDF) Wireless Network Security: Vulnerabilities, Threats and

    Abstract. Wireless networking provides many advantages, but it also coupled with new security. threats and alters the organization's overall in formation security risk profile. Although ...

  6. 1 A Systematic Literature Review on 5G Security

    s. The review mainly focused on cyber security. Due to the evolution of the 5G network's landscape, it has become more common for. security threats to appear at different levels. Through a systematic literature review, the authors of this review were able to provide a comprehensive under-standing of the num.

  7. Wireless Security Protocols WPA3: A Systematic Literature Review

    paper, a Sy stematic Literature Revi ew (SLR) was conducted to analyze three aspects of WPA3 protocol: the reasons behind the release of WPA3, the encryptio n methods a n d mode of operation in ...

  8. Wi-fi Security: a Literature Review of Security in Wireless Network

    As we know wireless networks have broadcast nature so there are different security issues in the wireless communication. The security conventions intended for the wired systems can't be extrapolated to wireless systems. Hackers and intruders can make utilization of the loopholes of the wireless communication.

  9. [2212.03299] A Systematic Literature Review on 5G Security

    A Systematic Literature Review on 5G Security. It is expected that the creation of next-generation wireless networks would result in the availability of high-speed and low-latency connectivity for every part of our life. As a result, it is important that the network is secure. The network's security environment has grown more complicated as a ...

  10. A Literature Review of Security Threats to Wireless Networks

    Computer Science, Engineering. 2020. TLDR. The research developed a web-based application (a captive portal) to help reduce the security threats associated with Wireless Local Area Network, by preventing intruders or hackers into the system through; capturing user credentials, masquerading as an internet cafe.

  11. A Review on Wireless Network Security

    A Review on Wireless Network Security. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115.

  12. A systematic literature review on wireless security testbeds in the

    The present work seeks to address a prominent literature gap, namely, the lack of a systematic review regarding the use of wireless-oriented security testbeds in CPS. We contribute an overarching, manifold review on this topic from 2016 onward, examining the various literature works from diverse angles, namely, the wireless technologies used ...

  13. Literature review on network security in Wireless Mobile Ad-hoc Network

    A literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications is presented. PurposeNowadays, more interest is found among the ...

  14. Analyzing and Evaluating the Security Standards in Wireless Network: a

    The major objective of this paper is studying security standards and analyzing them based on their features. In addition to presenting a detailed review about WPA3 and its improvements over the ...

  15. PDF Wireless Network Security

    The importance of wireless network security cannot be overstated, given the significant risks posed by cyber attacks. This paper provides an up-to-date review of the existing literature on wireless network security, including a comprehensive survey of threats, vulnerabilities, and countermeasures.

  16. Analysis of Attacks and Security Requirements for Wireless ...

    (WBAN OR "wireless body area network" OR "wearable wireless body area network") AND ("security risks" OR "security challenges" OR "security issues" OR "security requirements" OR "types of attack"). In addition to defining search strings, the digital libraries listed in Fig. 2 have been selected for the search process.

  17. Wireless Sensor Network security: A critical literature review

    As technology advances the use and popularity of Wireless Sensor Networks (WSN) have been growing. However, the network protocols associated with WSNs have primarily been designed for energy efficiency. In this paper we investigate the security mechanisms designed for each, the data-link, network and application layers. Through the review of recently publish material, this paper investigates ...

  18. Wi-Fi Security: A Literature Review of Security in Wireless Network

    Wi-Fi Security: A Literature Review of Security in Wireless Network. In this paper, the authors propose wireless networks have broadcast nature so there are different security issues in the ...

  19. A Literature Review of Security Threats to Wireless Networks

    Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Wireless networks are very common, both for organizations and individuals. Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits.

  20. A Literature Review of Security Threats to Wireless Networks

    A Literature Review of Security Threats to Wireless Networks. August 2014. International Journal of Future Generation Communication and Networking 7 (4):25-34. DOI: 10.14257/ijfgcn.2014.7.4.03.

  21. Wi-fi Security: a Literature Review of Security in Wireless Network

    The (unencrypted) IV is transmitted in the header of the packet. Index Copernicus Value: 3.0 - Articles can be sent to [email protected] Wi-Fi Security: A Literature Review of Security in Wireless Network 25 Figure 2: Simplified WEP Frame WEP Decryption The initialization vector (IV) is unencrypted in the header.

  22. Security in wireless body area networks via anonymous authentication

    Wireless Body Area Networks (WBANs) are a unique form of network that contains e-healthcare patient data, thus WBANs require a high level of privacy and security. There are several anonymous WBAN authentication systems in the literature, but this is the first paper to conduct a complete review of all the various schemes, then tabulate and ...

  23. (PDF) Survey on Wireless Network Security

    Maintenance of WLAN security is crucial. to an organization because WLANs are directly linked to the core or ganization' s network. In this paper, we review ed the. architectures and protocols ...