2021 International Conference on Advanced Computer Applications (ACA) 2021
DOI: 10.1109/aca52198.2021.9626810
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats in Wireless Network Communication-Status, Challenges, and Future Trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 58 publications
0
7
0
Order By: Relevance
“…The focus of the paper is on sender authentication utilizing asymmetric encryption with a one-way hash function to compute the public and private keys. (Kadhim & Sadkhan, 2021) presented that due to the broadcast nature of radio transmission, the wireless air interface is open and available to both authorized and illegal users. In a wired network, communication devices are interconnected together, thereby making it difficult for a station without a direct link to access the network for nefarious purposes.…”
Section: Asymmetric Encryption Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The focus of the paper is on sender authentication utilizing asymmetric encryption with a one-way hash function to compute the public and private keys. (Kadhim & Sadkhan, 2021) presented that due to the broadcast nature of radio transmission, the wireless air interface is open and available to both authorized and illegal users. In a wired network, communication devices are interconnected together, thereby making it difficult for a station without a direct link to access the network for nefarious purposes.…”
Section: Asymmetric Encryption Algorithmmentioning
confidence: 99%
“…Many laptop computers come with pre-installed wireless cards. Being able to join a network while on the go has a number of benefits (Kadhim & Sadkhan, 2021). Wireless communication is the exchange of data between two or more points that are not directly connected by an electrical transmitter.…”
Section: Introductionmentioning
confidence: 99%
“…Availability attacks are a form of DoS attack which attempts to disable access to the network using several types of MAC frames, such as de-authentication and de-association frames [14,15]. Wireless networks and technologies are generally more vulnerable to DoS attacks than wired alternatives [16].…”
Section: Introductionmentioning
confidence: 99%
“…Wireless communication is one of the most vibrant fields of research interest in the communication niche. The rise in the deployment of wireless communication systems (WCSs) has been attributed to its support for mobility and simplicity of deployment over a large distance compared to wired systems 1 . The wiring of all paths poses an additional cost for cabling plan changes 2 .…”
Section: Introductionmentioning
confidence: 99%
“…However, all these remote functionalities have severe consequences to human safety, especially from malicious intrusion and confidentiality challenges 3 . The open nature of the wireless communication channels has made them more accessible to various attacks and security issues despite the benefits posed to human lives 1 . For instance, hackers can now successfully infringe on the privacy of cellphone users and track users unguardedly, passively or actively.…”
Section: Introductionmentioning
confidence: 99%