The research study is conducted by using the
secondary source of data collection and the secondary source of data collection
leads towards the pre-existing data that is used for several other research
projects. This research is conducted by
analyzing several other studies related to Wireless
Security Tools.
This study also discusses the various experiment and experiences of the
research that they have been done for the Wireless
Security Tools. It also critically analyzed the
communication system for the Wireless
Security Tools along with its functions and
features that occur during its particular procedure.
In
this paper, secondary data techniques are utilized for collecting the relevant
information and these techniques include literature reviews. There is not
enough information available on the topic of Wireless Security Tools. Building research and relating it to the
already existing information is a foundational block of all activities
associated with academic research. But this process has become quite difficult
and complex. Within the field of science, production of knowledge is rapidly
increasing while at the same time, it remains interdisciplinary and
fragmented. That is the reason why the literature
review is considered a relevant method of researching and has been selected in
this paper.
A
literature review can be simplified as a systematic manner of synthesizing and
collecting previous research. A well-conducted and effective review as a method
of research develops a firm foundation for facilitating the development of
theory and advancing knowledge. Through the integration of perspective sand
findings from various empirical findings, research objectives can be attained
with a power that no individual research possesses.
The
qualitative research study is used to enhancing the understanding of the
fundamental opinion of the research study. This research study is also used to
helping the development of the innovative ideas of the research. It also
includes the key performance indicators which can be quantified for using this
technique. By considering the assessment, the objective of the research can be
addressed by using qualitative techniques. The Qualitative technique is relying
on generating results on an assumption base. This research study is conducted
by using qualitative data by carrying out the interviews. The qualitative
research method is used for conducting the research study related to the
performance of the Wireless Security
Tools. This study is quite efficient for analyzing the data through the Observations.
For
the qualitative research method the studies of the several other authors are
taken as the example Roundabout 140 studies of the various authors are analyzed
but few of them are discusses in the study due to the time taking facts of the
interviews. The simple random sampling techniques are used as the sampling
techniques for this research study according to the qualitative research
method. Under this procedure of collecting the data from the previous studies
the time span is selected from last year’s 05 2015-2019. The various studies of
various authors from the last 05 years have been selected randomly in order to
analyze the Wireless Security Tools.
Conclusion
and Future Work of
Wireless Security Tools
By
summing up the entire discussion it has been concluded that wireless
technologies have become one of the most important needs of human beings in the
age of the technology. The use of technology has grown rapidly with the passage
of time. Most of the population of the world is moving towards wireless
technologies.
These
statics represents that the amount of mobile subscribers has been growing
rapidly and it reached 6.8 billion worldwide as well as it has occupied more
than 40% of the total population of the world. While it has been indicated in
the several reports that the rapidly growing numbers of the wireless devices
are misused for the cybercriminal illicit activities. It includes online
bullying/stalking, computer hacking, financial information theft, malicious attacks
and so on. It has become the cause of big loss round about 83billion euros
along with the approximate 556 million users worldwide impacted by using
cybercrime every year.
The
security requirements are referred to as the availability, authenticity, integrity
and confidentiality. In terms of WSN the threats of the security particularly
differ from the non-energy and wired constraints for the wireless networks. In
order to reduce or avoid the threats or the issues, some notable security
issues will be highlighted in this research related to wireless networking and
computing devices or systems with addressing the issues of security within two
aspects.
The
Security characteristics of the computer systems are vulnerability,
availability, authorization, nonrepudiation, confidentiality, anonymity as well
as integrity. The most recent related researches are showing that around sixty
existing of the whole world’s population would be living in the environment of
urbanely in the year 2030.
This
study is conducted by using the secondary source of data collection and
literature reviews are an essential part in order to provide the arguments
about the wireless security tools. There are various security tolls that are analyzed
and observed in this study and these are…………………………………………………………………………………………….
As far as the future work is concerned
regarding the wireless security tools then following needs to be considered in
this regard:
·
The
security tools must be analyzed in effective manners for various wireless
devices.
·
In
future studies these tools must be tested during the developmental phase of the
security tools.
·
The
deep insight required to be taken related to the security parameters for the wireless
networks and devices.
·
The
users of web applications can be provided proper guidance for maintaining the
security of wireless devices.
·
The
authentication and the authorization of the users of the wireless devices are
required to follow the strict
·
The
security tools must be improved with the changes and innovations in the devices
and infrastructure.
References of Wireless Security Tools
[1]
|
Y. Z. J. W. X.
&. H. L. Zou, " A Survey on Wireless Security: Technical
Challenges, Recent Advances, and Future Trends.," Proceedings of
the IEEE, , vol. 104, no. 9, p. 1727–1765., 2016.
|
[2]
|
O. &. S. O. K.
Can, " A survey of intrusion detection systems in wireless sensor
networks.," 6th International Conference on Modeling, Simulation,
and Applied Optimization (ICMSAO)., 2015.
|
[3]
|
R. S. Rakhi
Budhran, "Wireless Local Area Networks: Threats and Their," International
Journal of Advanced Networking Applications (IJANA), 2015.
|
[4]
|
A. M. A. &. M.
R. H. Enaam Faihan Alotaibi, "Mobile Computing Security: Issues and
Requirements," Journal of Advances in Information Technology, vol.
7, no. 1, pp. 8-12, 2016.
|
[5]
|
O. Tayan,
"Concepts and Tools for Protecting Sensitive Data in the IT Industry:
A Review of Trends, Challenges and Mechanisms for Data-Protection," International
Journal of Advanced Computer Science and Applications, vol. 8, no. 2,
pp. 46-52, 2017.
|
[6]
|
J. A.-M. D. S. N.
A. S. A. &. J. J. R. Shaker Alanazi, "On resilience of Wireless
Mesh routing protocol against DoS attacks in IoT-based ambient assisted
living applications," 2015 17th International Conference on
E-health Networking, Application & Services (HealthCom), vol. 1,
pp. 14-17, 2016.
|
[7]
|
M. S. Eyadat,
"Higher Education Administrators Roles in Fortification of Information
Security Program," Journal of Academic Administration in Higher
Education, vol. 11, no. 2, pp. 61-68, 2015.
|
[8]
|
A. A. &. L.
Tawalbeh, "Cyber Security Attacks on Smart Cities and Associated
Mobile Technologies," The International Workshop on Smart Cities
Systems Engineering, vol. 109, pp. 1086-1091, 2017.
|
[9]
|
T. R. S. &. E.
S. Essa Q. Shahra, "A Comparative Study of Range-Free and Range-Based
Localization Protocols for Wireless Sensor Network: Using COOJA
Simulator," International Journal of Distributed Systems and
Technologies (IJDST), vol. 8, no. 1, p. 16, 2017.
|