Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Literature Review of Wireless Security Tools

Category: Computer Sciences Paper Type: Dissertation & Thesis Writing Reference: IEEE Words: 2100

As stated by Albar and Faihan (2016), the computing machines in sizes have been reduced in the very recent years as well as the power of these devices for computing has been increased which has effectively helped to generate the concept of the wireless computing devices such as laptops, data storage devices, PDAs, smartphones, cell phones as well as other mobile devices. The acquisition of these devices is begun by various people due to the advantages as well as nature like it is very easy to carry out as well as it is transportable from place to place.

 However, the new security threats have been introduced which were not arouse in the traditional computing as well as the threats must be recognized for the protection of the sensitive information of the users as well as the physical wireless devices in the sense of the popularity and the widespread of the wireless devices.

In order to reduce or avoid the threats or the issues, some notable security issues will be highlighted in this research related to wireless networking and computing devices or systems with addressing the issues of security within two aspects. The first one is linked for the transmission on networks wirelessly as well as the second aspect is linked for the information exist in the wireless mobile devices. Lastly, particular requirements as well as the procedures are also presented.  

The latest evolution is owned by the emergence of wireless mobile computing within the scope of the information system as well as the computing system. A new security issue has been introduced by several available mobile data applications which cause damage to the users of mobile devices because of the popularity of the wireless devices. A brief history of the evolution of the technologies of mobile computing was analyzed. So, the predominant distinguished characteristics of the mobile computing with the other tradition computing are small size, power sources used, and the nature of using the mobile, the connectivity of wireless network devices as well as the functions which are the specific as well as required for the users of the mobile.

The Security characteristics of the computer systems are vulnerability, availability, authorization, nonrepudiation, confidentiality, anonymity as well as integrity. The major security threats are also mentioned in this study that are the fabrication, modification, interception as well as the interruption. Furthermore, two parts of the security issue linked to mobile computing are also highlighted here. The issues associated with the systems of network, communication as well as the wireless system with the transmitted information on these mediums, as well as any other problems or issues linked to the wireless devices with the information as well as the data living it.

Some of the security requirements have also been reviewed for the mobile computing such as the standards, the controlling access to the functions that depend on user’s location, the randomization of the security, the sandboxing of the application as well as the encryptions with some steps which are suggested for following them for increasing the aspects of the security of the mobile computing in this study [4].

Figure 1: General security aspects


Figure 2: Comparison between the wireless and wired networks in

Source: http://sci-hub.tw/https://ieeexplore.ieee.org/abstract/document/7467419

According to Tayan (2017), huge efforts are spent by the organization, individuals as well as the rates of exponential in the advancements in the storage, access of the multimedia as well as the dissemination of the multimedia information on the internet for the exerting the user’s fingerprints by using the resources of online multimedia to e-commerce, services, propagate thoughts, the policies as well as other types of the information.

Moreover, it may classify the data at a different level within the critical types of the data, sensitive as well as the confidential data types. The data that is mentioned above have been subject to the various approaches as well as the tools for the provision of the management of data, the mechanisms of the storage as well as the automated data processing. It has also been emerged by various techniques as well as the tools to protect the information according to the particular requirements as well as at the different levels of the organization. There are three kinds of information security aspects that have been discussed in this paper which consist of the prevention of the access of the data, in-transit data as well as the storage of the data for the users who are unauthorized.

As stated by Tayan (2017), the study on the wireless security tools presents as well as reviews the most common challenges and the latest trends in the information security related to some vulnerabilities as well as the data breaches found in the industry nowadays by using the very simple summaries for the advantage of the academic as well as the information technology practitioners.

The techniques of state of the art used for making the content of the information secure commonly needed in the software application, the websites as well as the in-house software operations are given. The methods for the maximization of the protection of the data under some challenges as well as some major vulnerabilities that are also discussed. In the last, the significance of the policies of the information security usage as well as the standards to protect the content of the data of the organization which is mentioned with the open issues for the future work that can be easily identified [5].

According to Eyadat (2015), significant benefits are produced for organizations by information systems. However, an excellent amount of time and money are invested to attain as well as to manage the data in the sense of maintaining the high-level performance as well as for remaining the competition. So several factors are also there that can be impactful for on the performance as well as the management information of the organization. The most important factor is to keep secure the environment or the organization.

For making more secure the environment of the organization as well as making more efficient for the program of information security. The major focus of this research is double. In the very first, the effect of the higher education administrator’s responsibilities to make stronger the system of information security to investigate. Secondly, the significance of the information security program as well as the state to be explored in higher education. The whole research study is based on the prior approaches as well as the existing strategies of the information security theory as well as the research was conducted in the several institutions around 59 [6].

Figure3:IoT-based AAL application of Wireless Security Tools

The supervision of the top management as well as the lack of support for the program of the information security were indicated by the findings of the whole research. Furthermore, the high rate of the troublesome as well as the alarming of the unawareness of the security of the data or the information having no program for the training and education available within the institutions that have been surveyed.

The requirement was shown by the lack of the basic knowledge or the information as well as the implementation of the security between the preponderances of the highlighted institutes that have been surveyed for the activation the responsibilities of the managers for deploying well managed and well-structured system of the information security [7].

According to Tawalbeh (2017), smart cities refer to the city which combines the latest technologies to make them automat as well as the provision of efficient services for the maximization of the lifestyle of the citizens. The most recent related researches are showing that around sixty existing of the whole world’s population would be living in the environment of urbanely in the year 2030. So the massively enhancing population in the urban environment pointers for the need for some techniques of advanced management which will use the modern techniques as well as the information technology platforms to make smarten each service of city-related. There are several challenged related to the security faced by such kind of the integrated emergent technologies due to the security tests that are not considered for the latest and modern technologies which are deployed as well as in the addition for not to conjoin the different system parties along with the incidents of the security because of the high as well as strong communication.

As stated by Tawalbeh (2017), intensive communication, high complexity as well as high interdependency on the other hand lead to unbounded surface attacks as well as the issues and the problems related to cryptography. So, there are several things are discussed in the research study as we anticipate for the provision of detailed overview that based on the literature of major and center security problems of the smart cities as well as the related best current solutions. Furthermore, a number of the factors that are very influential are presented by us which are very impactful for the related data as well as information security into the smart cities [8]. The below figure explains the dimension of the smart cities in order to explain the importance of the Wireless security networks.                                                                             


Figure 4: Dimensions of Smart Cities

In several fields including the services related to the human, the applications based on the mechanics, the smart homes as well as the military operations, the sensors that used in wireless networking are deployed. Therefore, several challenges are encountered by the WSN deployment. One of the most significant challenges as well as the major issues is localizing the position of the node, especially the targets of the mobile within the very complicated situations or conditions.

In this research study, the two types are analyzed from the algorithms of the range free localization by the authors of the research, namely such as the protocols of the distance vector Hop (DV-Hops), received signal strength (RSS) as well as the Centroid by using the simulator of Cooja. The recognizing values of the process of received signal strength are required by the algorithms of the RSS localization form the anchor nodes throughout the node of the mobile for the measurement of the distance among the very first three anchor nodes as well as the unknown mobile within the range of the mobile.

Only three anchors are required for the computation of the location of the sensor of the mobile without the requirement to measure the distance by the localization of the centroid. In the last, the tables of the routing of every anchor are used within the topology of the networking by the algorithm of the DV-Hop for the computation of the distance averagely of Hops. The findings of the research show that the algorithms based on the mobile range are more perfect rather than the range fee [9].

References of Wireless Security Tools

[1]

A. M. A. &. M. R. H. Enaam Faihan Alotaibi, "Mobile Computing Security: Issues and Requirements," Journal of Advances in Information Technology, vol. 7, no. 1, pp. 8-12, 2016.

[2]

O. Tayan, "Concepts and Tools for Protecting Sensitive Data in the IT Industry: A Review of Trends, Challenges and Mechanisms for Data-Protection," International Journal of Advanced Computer Science and Applications, vol. 8, no. 2, pp. 46-52, 2017.

[3]

J. A.-M. D. S. N. A. S. A. &. J. J. R. Shaker Alanazi, "On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications," 2015 17th International Conference on E-health Networking, Application & Services (HealthCom), vol. 1, pp. 14-17, 2016.

[4]

M. S. Eyadat, "Higher Education Administrators Roles in Fortification of Information Security Program," Journal of Academic Administration in Higher Education, vol. 11, no. 2, pp. 61-68, 2015.

[5]

A. A. &. L. Tawalbeh, "Cyber Security Attacks on Smart Cities and Associated Mobile Technologies," The International Workshop on Smart Cities Systems Engineering, vol. 109, pp. 1086-1091, 2017.

[6]

T. R. S. &. E. S. Essa Q. Shahra, "A Comparative Study of Range-Free and Range-Based Localization Protocols for Wireless Sensor Network: Using COOJA Simulator," International Journal of Distributed Systems and Technologies (IJDST), vol. 8, no. 1, p. 16, 2017.

[7]

Y. Z. J. W. X. &. H. L. Zou, " A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends.," Proceedings of the IEEE, , vol. 104, no. 9, p. 1727–1765., 2016.

[8]

O. &. S. O. K. Can, " A survey of intrusion detection systems in wireless sensor networks.," 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO)., 2015.

[9]

R. S. Rakhi Budhran, "Wireless Local Area Networks: Threats and Their," International Journal of Advanced Networking Applications (IJANA), 2015.

 

 

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed