Got it

Wireless Networks - Security Challenges

Latest reply: Jan 16, 2022 22:00:03 947 68 49 0 0

Hello, everyone!


Today, I would like to briefly share on the security challenges of wireless networks.


Security is the primary concern specially when data is transmitting from end to end, it must be secured, and protected.


  • Wireless Medium : In a wireless network, jamming and scrambling are public security issues, and it is using a weapon in a wireless network by an attacker for effecting normal operations. In the jamming type of vulnerability, the attacker can use the hardware for exploiting the powerful noises for disturbance in wireless transmission signals, and as a result, the connections between the nodes are affected.


    Scrambling is also a type of jamming but is used based on occasional intervals. In scrambling, the transmission sometimes works smoothly, however, there is also the possibility of sudden blockage, and the result is the same as jamming.


  • Cooperative MAC : At the data layer level, the wireless network is using the Medium Access Control (MAC) protocol, and this is shared among all connection points. Cooperative MAC is creating a huge impact on wireless communication performance.


    It is creating a packet collision issue, generating an extra burden on bandwidth, power utilization, and computational processing. It is impacting when the sender is sending the packet ready to send (RTS) to the destination with clear to send (CTS). In this type, the malicious point hacks the MAC for a long time, and unnecessary transmission generates and other points are unable to contribute to communication.


  • Multihop Environment : A wireless environment is a multi-hop architecture because it provides convenience in process and easy to deploy. In this architecture, the user data is transmitted from source to destination by hop to hop.


    Multi-hop architecture is cost-effective, point flexible, easily configurable, and manageable. It is providing reliability and multi-points as well. In this architecture, if any point fails, the alternate path is used to the communication process. There are three main issues in this architecture


    (1)    Increase the burden on routing

    (2)    Risk will be increased in security aspect

    (3)    Bandwidth utilization will be high.


  • Power Limitations : The wireless device is using power via its battery. There is a challenge in case an unwanted process executes on the device, and it is consuming power without requiring the process. A sleeping mode is an option, which overcomes this limitation, and the device is still in connecting mode.


You are welcome to like and exchange in the comment area. Stay safe and Thank you!

t_0002.gif

THANK YOU
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Jan 17, 2022 22:13:04 (0) (0)
Thank you!    
Good share
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Jan 17, 2022 22:13:10 (0) (0)
Thank you!    
Thanks for sharing
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Jan 17, 2022 22:13:16 (0) (0)
Thank you!    
Good one
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Jan 17, 2022 22:13:21 (0) (0)
Thank you!    
Useful knowledge
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Jan 17, 2022 22:13:26 (0) (0)
Thank you!    
great sharing
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Jan 17, 2022 22:13:32 (0) (0)
Thank you!    
Thanks for sharing
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Jan 17, 2022 22:13:39 (0) (0)
Thank you!    
Nice one.
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Jan 17, 2022 22:13:45 (0) (0)
Thank you!    
Thank you
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Jan 17, 2022 22:13:51 (0) (0)
Thank you!    

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.