The research study focuses
on the analysis and identifications of wireless security tools. It also
explores the analysis of the various security tools in order to provide good
services to the users of the wireless devices. This study is conducted by using
the secondary source of data collection and the qualitative research method is
employed in this study. For the qualitative research method, the studies of the
several other authors are taken as the example Roundabout 140 studies of the
various authors are analyzed but few of them are discusses in the study due to
the time taking facts of the interviews. The simple random sampling techniques
are used as the sampling techniques for this research study according to a qualitative
research method. Under this procedure of collecting the data from the previous
studies the time span is selected from last year’s 05 2015-2019. The various
studies of various authors from the last 05 years have been selected randomly
in order to analyze the Wireless Security Tools. There are most important tools
that are discussed in this study and these are;
Introduction
of Wireless Security Tools
The
services and infrastructure of wireless communication have been blooming during
the recent decades along with major objectives of the meeting due to which the
demand is growing rapidly. It has been indicated in the latest statics that is released
by the Union of International telecommunication in 2013.
These
statics represents that the amount of mobile subscribers has been growing
rapidly and it reached 6.8 billion worldwide as well as it has occupied more
than 40% of the total population of the world. While it has been indicated in
the several reports that the rapidly growing numbers of the wireless devices
are misused for the cybercriminal illicit activities. It includes online
bullying/stalking, computer hacking, financial information theft, malicious
attacks and so on. It has become the cause of big loss round about 83billion
euros along with the approximate 556 million users worldwide impacted by using cybercrime
every year.
According
to the report of the Norton cybercrime of 2012 the security issues of the wireless
network are increasing with the passage of time. Thus, it is considered the one of the most
important in order to improve the security of wireless communication for
fighting against the activities of cybercrime each year particularly due to the
utilization of wireless devices by more and more people. Such as it commonly
used for personal emails, online banking and owning for the widespread
utilization of smart phones [1].
Generally,
the architecture of the OSI protocols adopted by the wireless networks. These
are contained on the layers of the applications such as; physical layers,
transports layers, Mac layers and network layers that are usually protected
separately from each of the layers in order to acquire the requirements of the
securities. The security requirements are referred to as the availability,
authenticity, integrity and confidentiality. As indicated in the below-given
figures methodologies for the main wireless security including encryption,
authentication and authorization for the various diverse design factors such as
the communication latency security level and implementation complexity required
to be balanced.
Figure
1: Wireless
security methodologies and design factors of Wireless Security
Tools
Source:
[1]
Security
is referred to as an essential consideration. All aspects related to computing
must be taken in it and particularly in mobile computing due to the several
threats that occur in the life of mobile users. Sometimes these threats cannot
be exposed to the user of traditional computing. The stooling and lose of the sensitive
and private data of the mobile user are considered as the major threats which
can easily store for their devices. Sometimes this data can be used badly by
various threats and hackers. The threats of the computing system can be defined
in various manners as a situation that has the possibility for the damage, loss
and cause for this system. The mobile
computing is considered as the capabilities for computing which can easily rely
upon the infrastructure of the preexisting distributed systems.
In
terms of WSN the threats of the security particularly differ from the non-energy
and wired constraints for the wireless networks. Due to the typical properties
of the WSNs the variances occur in the various items. For WSN the energy is
considered as an essential constraint as well as fir its particular three
components of the security. It also includes the various kinds of the three
components; availability, confidentiality and integrity. The energy is
considered as basic concepts [2].
The
explanations for all of these security elements explain below in order to
analyze the security threats for its particular uses.
Confidentiality
of
Wireless Security Tools
According
to the paradigm of the cybersecurity the confidentiality is one of the most
important well-known as well as paid attention components. Users were struggling to send the data
without disclosing the contents for attackers. It is considered the easiest
task in the communication of the wireless networks it is easiest to listen to understand
data that is sent in networks.
Integrity
of
Wireless Security Tools
It is
considered as the data protection according to the modified reports through the
unauthorized sides and unwanted data. The environment can be easily monitored
by using the network of wireless sensors. They are engaged in working for the
evaluation sensed data from these environments.
Availability
of
Wireless Security Tools
It
leads towards the ranges of the variety of the observed attacks, it has been
observed easily that few of the attacks are particularly targeting the data
which is transferred throughout the whole network. In order to make sure the
not working of the network there are few other attacks that are usually not
working.
Energy
of
Wireless Security Tools
There
are various energy constraints and all of these are engaged in affecting plans
of the security. The limited energy has been lemmatized by the computational
resources [3].
1.1.Problem
Statement of Wireless
Security Tools
Due
to the rapid growth of the innovations in technologies the word is moving toward
the smart working ad smart industry. Everything is transferring to the latest
technologies. The trends of wireless technologies have become more common and
it has made human life easier and convenient. As human beings are becoming the
victims of wireless technologies due to this the demand for the demands of the
wireless security tools will also increase. There are a lot of the research
studies that are conducted to develop or maintain and explores the working of
wireless network security tools but there is a lack of analysis for the
wireless network security tools.
1.2.Aims
and objectives of Wireless
Security Tools
There
are several aims of this study that will be attained in the next chapters of
the research study but the most important and major objectives of the research
study are explored in such manners. These are;
·
To
analyze the wireless security tools along with its features, functioning and
design.
·
To
explore the importance of wireless security tools.
·
To
access the proper authentication of the wireless security tools by comparing it
with various other security tools.
1.3.Organization
of the paper of Wireless
Security Tools
The
research study contains on the five major sections and these sections are explains
below with brief descriptions
Introduction:
It is the first section of the study which introduces the title of the study
along with the strong justification. In this section the problem statement is
defined and objectives are also developed.
Literature
review: this section of the research study explores the related works of the
various authors in order to emphasize the objective and attaining the
objectives.
Methodology:
It is the third section of the study that explains the methods and materials
that are adopted in order to conduct the research study.
Results
and analysis: This is the fourth chapter of the research study and central
point of the study because it explores completes results of the study that have
been observed and the required tools are also explained in this part of the
study.
Conclusion:
It is the last and final chapter of the study and concluded the main aim and
objectives of the research along with the entire work that has been conducted
in this study.
References of Executives Summary of Wireless Security Tools
[1]
|
Y. Z. J. W. X.
&. H. L. Zou, " A Survey on Wireless Security: Technical
Challenges, Recent Advances, and Future Trends.," Proceedings of
the IEEE, , vol. 104, no. 9, p. 1727–1765., 2016.
|
[2]
|
O. &. S. O. K.
Can, " A survey of intrusion detection systems in wireless sensor
networks.," 6th International Conference on Modeling, Simulation,
and Applied Optimization (ICMSAO)., 2015.
|
[3]
|
R. S. Rakhi
Budhran, "Wireless Local Area Networks: Threats and Their," International
Journal of Advanced Networking Applications (IJANA), 2015.
|