Enhancing Wireless Network Security: A Comprehensive Review and Future Perspectives

Authors

  • Ajish M. Thomos Assistant Professor, Computer Application, Musaliar College of Arts and Science, Pathanamthitta, Kerala, India
  • Soni Joy Senior Software Developer, Developers Team, CODEPOINT Softwares Pvt. Ltd., Kochi, Kerala
  • Rose Mariya Joy Support Engineer, Supporters Team, SHIPMATE - SBN TechnoLogics Pvt Ltd, Kochi, Kerala

Keywords:

Wireless Security, Network Security, Cryptographic Protocols, Intrusion Detection Systems, Authentication Mechanisms, Machine Learning, Blockchain, Denial-of-Service Attacks

Abstract

This study provides a thorough examination of wireless network security, addressing current challenges and proposing future strategies for enhanced protection. It delves into vulnerabilities such as eavesdropping, unauthorized access, and denial-of-service attacks prevalent in wireless environments. The study explores cryptographic protocols, intrusion detection systems, and authentication mechanisms crucial for safeguarding wireless networks. Additionally, it discusses emerging technologies, including machine learning and blockchain, as potential solutions to fortify wireless security. This comprehensive review aims to guide researchers, practitioners, and policymakers in shaping the future of secure wireless communication.

References

Singh A, Gupta BB. Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions. Int J Semant Web Inf Syst (IJSWIS). 2022 Jan 1; 18(1): 1–43.

Kan K, Une M. Recent Trends on Research and Development of Quantum Computers and Standardization of Post-Quantum Cryptography. Institute for Monetary and Economic Studies, Bank of Japan; 2021 Jun; 77–108.

Diffie W, Hellman ME. New directions in cryptography. In Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman. ACM Digital Library; 2022 Aug 24; 365–390.

Jan SU, Ahmed S, Shakhov V, Koo I. Toward a lightweight intrusion detection system for the internet of things. IEEE Access. 2019 Mar 28; 7: 42450–71.

Sarkar A, Chatterjee SR, Chakraborty M. Role of cryptography in network security. The "Essence" of Network Security: An End-to-End Panorama. Singapore: Springer; 2021; 103–43.

Ming R, VanBuren R, Wai CM, Tang H, Schatz MC, Bowers JE, Lyons E, Wang ML, Chen J, Biggers E, Zhang J. The pineapple genome and the evolution of CAM photosynthesis. Nat Genet. 2015 Dec; 47(12): 1435–42.

Sidhu J. Syscoin: A peer-to-peer electronic cash system with blockchain-based services for e-business. In 2017 26th IEEE international conference on computer communication and networks (ICCCN). 2017 Jul 31; 1–6.

Yegireddi R, Kumar RK. A survey on conventional encryption algorithms of Cryptography. In 2016 International Conference on ICT in Business Industry & Government (ICTBIG). 2016 Nov 18; 1–4.

Mansoor A, Anbar M, Bahashwan AA, Alabsi BA, Rihan SD. Deep Learning-Based Approach for Detecting DDoS Attack on Software-Defined Networking Controller. Systems. 2023 Jun 9; 11(6): 296.

Mallouli F, Hellal A, Saeed NS, Alzahrani FA. A survey on cryptography: comparative study between RSA vs ECC algorithms, and RSA vs. El-Gamal algorithms. In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). 2019 Jun 21; 173–176.

Published

2024-01-24