Open Access Open Access  Restricted Access Subscription Access

Review on Security Threats of Wireless Networks


Affiliations
1 DMIETR Sawangi (Meghe), Wardha-442001, Maharashtra,India
 

Wireless networks are gaining popularity to get its highest and strongest level today, as the users want connectivity in terms of wireless medium irrespective of their geographic position. On the Wireless Network, there is an increasing threats, viruses and various attacks. The main goal of this paper, is to provide a survey of the wireless network and attacks that occur on the wireless network. The Design of wireless Network uses NS2, which is based on Security evaluation, and it also describes the proposed model of the system as well as complete description of the Simulations and software program needed for implementing the Wireless Network. NS2 is a very widely used tool of networks. This paper also provides an overview of routing protocols being used in wireless networks. Ad-hoc network must have a secure way for transmission and communication which is quite challenging and phrasing most issues regarding to the wireless networks. Ad-hoc network are rapidly gaining popularity because they do not depends on a pre-infrastructure and can be deployed quickly. Ad-hoc network is used from offices to modern battlefields this is the application of it. It has open secure functionality hence it uses most on private places and also for mobile communication purposes.
User
Notifications
Font Size

  • Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko,” A Specification-based Intrusion Detection System for AODV”, Proceedings of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks, pp.125-134, 2003
  • Sreedhar. C, Dr. S. MadhusudhanaVerma and Dr. N. Kasiviswanath,”Potential Security Attacks On Wireless networks and Their Countermeasure”, International Journal of Computer Science & Information Technology (IJCSIT), Vol.2, No.5, pp. 76-89, October 2010.
  • NitalMistry and Devesh C Jinwala,” Improving AODV Protocol against Black hole attacks”, Proceedings of the International MultiConference of Engineers and Computer Scientists, Vol II, March 2010.
  • Dr.M.S.Aswal, ParamjeetRawat, Tarun Kumar”, Threats and Vulnerabilities in Wireless Mesh Networks”, International Journal of RecentTrends in Engineering, Vol 2, No. 4, pp. 155-158, November 2009.
  • Shalini Jain and Dr.Satbir Jain,” Detection and Prevention of Wormhole attack in mobile Ad hoc networks”, International Journal of Computer Theory and Engineering, Vol. 2, No. 1, pp.78-86, February, 2010.
  • Amol A. Bhosle, Tushar P. Thosar and SnehalMehatre, ” Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET”, International Journal of Computer Science, Engineering and Applications (IJCSEA, Vol.2, No.1, pp. 45-54, February 2012.
  • Richard kissel ,kevin Stine ,and Matthew “Information Security” NIST Special publication 800-64 Revision 2,October 2008 .
  • Wireless Communication, link http://www.atis.org/, Archived from the original on 2008-01-02.
  • Andrea Goldsmith, Wireless Communications, Cambridge University Press, September 2005, ISBN13: 9780521837163.
  • William Stallings, Wireless communications and networking, William Stallings books on computer and data communications technology, Publisher Prentice Hall, 2002, ISBN10 0130408646.

Abstract Views: 183

PDF Views: 81




  • Review on Security Threats of Wireless Networks

Abstract Views: 183  |  PDF Views: 81

Authors

Leena L. Nikhare, Neha M. Nandagawali
DMIETR Sawangi (Meghe), Wardha-442001, Maharashtra,India

Abstract


Wireless networks are gaining popularity to get its highest and strongest level today, as the users want connectivity in terms of wireless medium irrespective of their geographic position. On the Wireless Network, there is an increasing threats, viruses and various attacks. The main goal of this paper, is to provide a survey of the wireless network and attacks that occur on the wireless network. The Design of wireless Network uses NS2, which is based on Security evaluation, and it also describes the proposed model of the system as well as complete description of the Simulations and software program needed for implementing the Wireless Network. NS2 is a very widely used tool of networks. This paper also provides an overview of routing protocols being used in wireless networks. Ad-hoc network must have a secure way for transmission and communication which is quite challenging and phrasing most issues regarding to the wireless networks. Ad-hoc network are rapidly gaining popularity because they do not depends on a pre-infrastructure and can be deployed quickly. Ad-hoc network is used from offices to modern battlefields this is the application of it. It has open secure functionality hence it uses most on private places and also for mobile communication purposes.

References