Review on Security Threats of Wireless Networks

Leena L. Nikhare and Neha M. Nandagawali
Volume 1: Issue 2, Revised on – 30 June 2020, pp 75-80


Author's Information
Leena L. Nikhare1 
Corresponding Author
1DMIETR Sawangi (Meghe), Wardha-442001, Maharashtra,India
leenanikhare44@gmail.com

Neha M. Nandagawali2
2DMIETR Sawangi (Meghe), Wardha-442001, Maharashtra,India.


Review Article -- Peer Reviewed
First online on – 30 March 2015,      Revised on – 30 June 2020

Open Access article under Creative Commons License

Cite this article –Leena L. Nikhare and Neha M. Nandagawali, “Review on Security Threats of Wireless Networks”, International Journal of Computational and Electronics Aspects in Engineering, RAME Publishers, vol. 1, issue 2, pp. 75-80, 2015, Revised in 2020.
https://doi.org/10.26706/ijceae.1.2.20150106


Abstract:-
Wireless networks are gaining popularity to get its highest and strongest level today, as the users want connectivity in terms of wireless medium irrespective of their geographic position. On the Wireless Network, there is an increasing threats, viruses and various attacks. The main goal of this paper, is to provide a survey of the wireless network and attacks that occur on the wireless network. The Design of wireless Network uses NS2, which is based on Security evaluation, and it also describes the proposed model of the system as well as complete description of the Simulations and software program needed for implementing the Wireless Network. NS2 is a very widely used tool of networks. This paper also provides an overview of routing protocols being used in wireless networks. Ad-hoc network must have a secure way for transmission and communication which is quite challenging and phrasing most issues regarding to the wireless networks. Ad-hoc network are rapidly gaining popularity because they do not depends on a pre-infrastructure and can be deployed quickly. Ad-hoc network is used from offices to modern battlefields this is the application of it. It has open secure functionality hence it uses most on private places and also for mobile communication purposes.
Index Terms:-
Wireless Network, AODV, NS2, Security, Trace File format Routing Protocol.
REFERENCES
[1] Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko,” A Specification-based Intrusion Detection System for AODV”, Proceedings of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks, pp.125-134, 2003

[2] Sreedhar. C, Dr. S. MadhusudhanaVerma and Dr. N. Kasiviswanath,”Potential Security Attacks On Wireless networks and Their Countermeasure”, International Journal of Computer Science & Information Technology (IJCSIT), Vol.2, No.5, pp. 76-89, October 2010.

[3] NitalMistry and Devesh C Jinwala,” Improving AODV Protocol against Black hole attacks”, Proceedings of the International MultiConference of Engineers and Computer Scientists, Vol II, March 2010.

[4] Dr.M.S.Aswal, ParamjeetRawat, Tarun Kumar”, Threats and Vulnerabilities in Wireless Mesh Networks”, International Journal of RecentTrends in Engineering, Vol 2, No. 4, pp. 155-158, November 2009.

[5] Shalini Jain and Dr.Satbir Jain,” Detection and Prevention of Wormhole attack in mobile Ad hoc networks”, International Journal of Computer Theory and Engineering, Vol. 2, No. 1, pp.78-86, February, 2010.

[6] Amol A. Bhosle, Tushar P. Thosar and SnehalMehatre, ” Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET”, International Journal of Computer Science, Engineering and Applications (IJCSEA, Vol.2, No.1, pp. 45-54, February 2012.

[7] Richard kissel ,kevin Stine ,and Matthew “Information Security” NIST Special publication 800-64 Revision 2,October 2008 .

[8] Wireless Communication, link http://www.atis.org/, Archived from the original on 2008-01-02.

[9] Andrea Goldsmith, Wireless Communications, Cambridge University Press, September 2005, ISBN13: 9780521837163.

[10] William Stallings, Wireless communications and networking, William Stallings books on computer and data communications technology, Publisher Prentice Hall, 2002, ISBN10 0130408646.


To view full paper, Download here


To View Full Paper

Publishing with