As stated
by Albar and Faihan (2016), the computing machines in sizes have been reduced in
the very recent years as well as the power of these devices for computing has
been increased which has effectively helped to generate the concept of the
wireless computing devices such as laptops, data storage devices, PDAs,
smartphones, cell phones as well as other mobile devices. The acquisition of
these devices is begun by various people due to the advantages as well as nature
like it is very easy to carry out as well as it is transportable from place to
place.
However, the new security threats have been
introduced which were not arouse in the traditional computing as well as the
threats must be recognized for the protection of the sensitive information of
the users as well as the physical wireless devices in the sense of the
popularity and the widespread of the wireless devices.
In
order to reduce or avoid the threats or the issues, some notable security
issues will be highlighted in this research related to wireless networking and
computing devices or systems with addressing the issues of security within two
aspects. The first one is linked for the transmission on networks wirelessly as
well as the second aspect is linked for the information exist in the wireless
mobile devices. Lastly, particular requirements as well as the procedures are
also presented.
The latest
evolution is owned by the emergence of wireless mobile computing within the scope
of the information system as well as the computing system. A new security issue
has been introduced by several available mobile data applications which cause damage
to the users of mobile devices because of the popularity of the wireless
devices. A brief history of the evolution of the technologies of mobile
computing was analyzed. So, the predominant distinguished characteristics of
the mobile computing with the other tradition computing are small size, power
sources used, and the nature of using the mobile, the connectivity of wireless
network devices as well as the functions which are the specific as well as required
for the users of the mobile.
The Security
characteristics of the computer systems are vulnerability, availability,
authorization, nonrepudiation, confidentiality, anonymity as well as integrity.
The major security threats are also mentioned in this study that are the
fabrication, modification, interception as well as the interruption. Furthermore,
two parts of the security issue linked to mobile computing are also highlighted
here. The issues associated with the systems of network, communication as well
as the wireless system with the transmitted information on these mediums, as
well as any other problems or issues linked to the wireless devices with the information
as well as the data living it.
Some
of the security requirements have also been reviewed for the mobile computing such
as the standards, the controlling access to the functions that depend on user’s
location, the randomization of the security, the sandboxing of the application
as well as the encryptions with some steps which are suggested for following them
for increasing the aspects of the security of the mobile computing in this
study [4].
Figure
1: General security aspects
Figure
2: Comparison between the wireless and
wired networks in
Source: http://sci-hub.tw/https://ieeexplore.ieee.org/abstract/document/7467419
According
to Tayan (2017), huge efforts are spent by the organization, individuals as
well as the rates of exponential in the advancements in the storage, access of
the multimedia as well as the dissemination of the multimedia information on
the internet for the exerting the user’s fingerprints by using the resources of
online multimedia to e-commerce, services, propagate thoughts, the policies as
well as other types of the information.
Moreover,
it may classify the data at a different level within the critical types of the
data, sensitive as well as the confidential data types. The data that is
mentioned above have been subject to the various approaches as well as the
tools for the provision of the management of data, the mechanisms of the
storage as well as the automated data processing. It has also been emerged by
various techniques as well as the tools to protect the information according to
the particular requirements as well as at the different levels of the
organization. There are three kinds of information security aspects that have
been discussed in this paper which consist of the prevention of the access of
the data, in-transit data as well as the storage of the data for the users who
are unauthorized.
As
stated by Tayan (2017), the study on the wireless security tools presents as
well as reviews the most common challenges and the latest trends in the information
security related to some vulnerabilities as well as the data breaches found in
the industry nowadays by using the very simple summaries for the advantage of
the academic as well as the information technology practitioners.
The techniques
of state of the art used for making the content of the information secure commonly
needed in the software application, the websites as well as the in-house
software operations are given. The methods for the maximization of the
protection of the data under some challenges as well as some major
vulnerabilities that are also discussed. In the last, the significance of the
policies of the information security usage as well as the standards to protect the
content of the data of the organization which is mentioned with the open issues
for the future work that can be easily identified [5].
According
to Eyadat (2015), significant benefits are produced for organizations by information
systems. However, an excellent amount of time and money are invested to attain as
well as to manage the data in the sense of maintaining the high-level
performance as well as for remaining the competition. So several factors are
also there that can be impactful for on the performance as well as the management
information of the organization. The most important factor is to keep secure the
environment or the organization.
For
making more secure the environment of the organization as well as making more efficient
for the program of information security. The major focus of this research is
double. In the very first, the effect of the higher education administrator’s
responsibilities to make stronger the system of information security to
investigate. Secondly, the significance of the information security program as
well as the state to be explored in higher education. The whole research study is
based on the prior approaches as well as the existing strategies of the information
security theory as well as the research was conducted in the several
institutions around 59 [6].
Figure3:IoT-based AAL application of
Wireless Security Tools
The supervision
of the top management as well as the lack of support for the program of the
information security were indicated by the findings of the whole research. Furthermore,
the high rate of the troublesome as well as the alarming of the unawareness of
the security of the data or the information having no program for the training
and education available within the institutions that have been surveyed.
The
requirement was shown by the lack of the basic knowledge or the information as
well as the implementation of the security between the preponderances of the
highlighted institutes that have been surveyed for the activation the
responsibilities of the managers for deploying well managed and well-structured
system of the information security [7].
According to Tawalbeh (2017), smart
cities refer to the city which combines the latest technologies to make them
automat as well as the provision of efficient services for the maximization of
the lifestyle of the citizens. The most recent related researches are showing that
around sixty existing of the whole world’s population would be living in the environment
of urbanely in the year 2030. So the massively enhancing population in the
urban environment pointers for the need for some techniques of advanced management
which will use the modern techniques as well as the information technology platforms
to make smarten each service of city-related. There are several challenged
related to the security faced by such kind of the integrated emergent
technologies due to the security tests that are not considered for the latest and
modern technologies which are deployed as well as in the addition for not to conjoin
the different system parties along with the incidents of the security because
of the high as well as strong communication.
As stated by Tawalbeh (2017), intensive
communication, high complexity as well as high interdependency on the other
hand lead to unbounded surface attacks as well as the issues and the problems
related to cryptography. So, there are several things are discussed in the
research study as we anticipate for the provision of detailed overview that
based on the literature of major and center security problems of the smart
cities as well as the related best current solutions. Furthermore, a number of
the factors that are very influential are presented by us which are very
impactful for the related data as well as information security into the smart
cities [8].
The below figure explains the dimension of the smart cities in order to explain
the importance of the Wireless security networks.
Figure
4: Dimensions of Smart Cities
In several fields including the
services related to the human, the applications based on the mechanics, the
smart homes as well as the military operations, the sensors that used in wireless
networking are deployed. Therefore, several challenges are encountered by the
WSN deployment. One of the most significant challenges as well as the major
issues is localizing the position of the node, especially the targets of the
mobile within the very complicated situations or conditions.
In this research study, the two types are
analyzed from the algorithms of the range free localization by the authors of
the research, namely such as the protocols of the distance vector Hop (DV-Hops),
received signal strength (RSS) as well as the Centroid by using the simulator
of Cooja. The recognizing values of the process of received signal strength are
required by the algorithms of the RSS localization form the anchor nodes throughout
the node of the mobile for the measurement of the distance among the very first
three anchor nodes as well as the unknown mobile within the range of the
mobile.
Only three anchors are required for
the computation of the location of the sensor of the mobile without the requirement
to measure the distance by the localization of the centroid. In the last, the
tables of the routing of every anchor are used within the topology of the
networking by the algorithm of the DV-Hop for the computation of the distance averagely
of Hops. The findings of the research show that the algorithms based on the
mobile range are more perfect rather than the range fee [9].
References of Wireless Security Tools
[1]
|
A. M. A. &. M.
R. H. Enaam Faihan Alotaibi, "Mobile Computing Security: Issues and
Requirements," Journal of Advances in Information Technology, vol.
7, no. 1, pp. 8-12, 2016.
|
[2]
|
O. Tayan,
"Concepts and Tools for Protecting Sensitive Data in the IT Industry:
A Review of Trends, Challenges and Mechanisms for Data-Protection," International
Journal of Advanced Computer Science and Applications, vol. 8, no. 2,
pp. 46-52, 2017.
|
[3]
|
J. A.-M. D. S. N.
A. S. A. &. J. J. R. Shaker Alanazi, "On resilience of Wireless
Mesh routing protocol against DoS attacks in IoT-based ambient assisted
living applications," 2015 17th International Conference on
E-health Networking, Application & Services (HealthCom), vol. 1,
pp. 14-17, 2016.
|
[4]
|
M. S. Eyadat,
"Higher Education Administrators Roles in Fortification of Information
Security Program," Journal of Academic Administration in Higher
Education, vol. 11, no. 2, pp. 61-68, 2015.
|
[5]
|
A. A. &. L.
Tawalbeh, "Cyber Security Attacks on Smart Cities and Associated
Mobile Technologies," The International Workshop on Smart Cities
Systems Engineering, vol. 109, pp. 1086-1091, 2017.
|
[6]
|
T. R. S. &. E.
S. Essa Q. Shahra, "A Comparative Study of Range-Free and Range-Based
Localization Protocols for Wireless Sensor Network: Using COOJA
Simulator," International Journal of Distributed Systems and
Technologies (IJDST), vol. 8, no. 1, p. 16, 2017.
|
[7]
|
Y. Z. J. W. X.
&. H. L. Zou, " A Survey on Wireless Security: Technical
Challenges, Recent Advances, and Future Trends.," Proceedings of
the IEEE, , vol. 104, no. 9, p. 1727–1765., 2016.
|
[8]
|
O. &. S. O. K.
Can, " A survey of intrusion detection systems in wireless sensor
networks.," 6th International Conference on Modeling, Simulation,
and Applied Optimization (ICMSAO)., 2015.
|
[9]
|
R. S. Rakhi
Budhran, "Wireless Local Area Networks: Threats and Their," International
Journal of Advanced Networking Applications (IJANA), 2015.
|