CFP last date
20 March 2024
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024

Submit your paper
Know more
Reseach Article

Security Challenges in Wireless Networks

Published on May 2012 by Swapnil S. Tale, Paras A. Tolia
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 8
May 2012
Authors: Swapnil S. Tale, Paras A. Tolia
9964e854-846e-4c86-8b38-4aa93dc11513

Swapnil S. Tale, Paras A. Tolia . Security Challenges in Wireless Networks. National Conference on Recent Trends in Computing. NCRTC, 8 (May 2012), 15-18.

@article{
author = { Swapnil S. Tale, Paras A. Tolia },
title = { Security Challenges in Wireless Networks },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 8 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 15-18 },
numpages = 4,
url = { /proceedings/ncrtc/number8/6573-1063/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A Swapnil S. Tale
%A Paras A. Tolia
%T Security Challenges in Wireless Networks
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 8
%P 15-18
%D 2012
%I International Journal of Computer Applications
Abstract

Wireless networks have recently gained a lot of attention from the research community. Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are characterized as multi-hop wireless networks. WMN is an integrated broadband wireless network which provides high bandwidth internet service to user; whereas WSN is an application oriented and generally set up for gathering records from insecure environments Security has been a long trade off with Wi-Fi. Early wireless networks heavily leaned on WMNs to provide Layer 3 security, which kept aside from the additional overhead of encapsulation and challenges of roaming, Quality of Service, client support and scalability and left the IP network vulnerable to attacks. In the deployment of sensor nodes in an insecure environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. There are several limitations and vulnerable features of WMN and WSN, along with the associated security threats and possible defenses. Security requirements for wireless networks are confidentiality, data integrity, data authentication and service availability.

References
  1. John A. Stankovic, "Wireless Sensor Networks", www. wsntech. net (2006).
  2. SANS Institute InfoSec Reading Room, "Wireless LAN: Security Issues and Solutions"(2003).
  3. G. Padmavathi and D. Shanmugapriya, "A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks", International Journal of Computer Science and Information Security,(2009).
  4. H. Modares, R, Salleh, A. Moravejosharieh, "Overview of Security Issues in Wireless Sensor Networks", Third International Conference on Computational Intelligence,(2011).
  5. Tahir Naeem, Kok-Keong Loo, "Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802. 11 Wireless Mesh Networks", International Journal of Digital Content Technology and its Applications,(2009).
  6. Khidir M. Ali, Ali Al-Khalifah, "A Comparative Study of Authentication Methods for Wi-Fi Networks", A Comparative Study of Authentication Methods for Wi-Fi Networks,(2011).
  7. N. CHENDEB, B. E. HASSAN, and H. AFIFI, "Performance evaluation of the security in wireless local area networks (WiFi)", International Conference on Information and Communication Technologies,(2004).
  8. I. P. Mavridis, A. B. ?alkias, "Real-life paradigms of wireless network security attacks", Panhellenic Conference on Informatics,(2011).
Index Terms

Computer Science
Information Sciences

Keywords

Wmn Wsn Multi-hop Wireless Networks Security Requirements Sensor Nodes