Wireless Network Security Research Papers (original) (raw)

In this contemporary world, network computing has become one of the major requirements in today’s world. It can be seen in various places such as in home, universities, hospitals, airports, hotels, retail shops, banks, government sectors,... more

In this contemporary world, network computing has become one of the major requirements in
today’s world. It can be seen in various places such as in home, universities, hospitals, airports,
hotels, retail shops, banks, government sectors, etc. With all of these growths, the network
computing has continuously expanded in several aspects and areas such as in term of the
infrastructure’s size, complexity as well as the number of users that can accommodate.
(Malgaonkar, Patil, Rai, & Singh, 2017)Therefore, network computing can be categorized into
two types which are wired network and wireless network. Both of them work and operate
differently as well as they have different setup and architecture.
In the simplest sense, wireless technology enables and allows devices to start communicating
without the need of physical connections such as network cabling, whereas wired network
requires the users to communicate physically through a connection cable between the user’s
device and the network device. The wireless technology uses radio frequency transmissions to
transmit the generated data by the connected devices. Besides that, wireless networks can also
be classified into several groups based on their coverage. These classifications can be like
Wireless Wide Area Network “WWAN,” Wireless Personal Area Network “WPAN” and
WLANs. WWAN is typically responsible for transmitting the data for mobile communication
which includes 2G cellular, Global System for mobile communication “GSM” and more (AbuTair & Bhatti, 2017).
For WLAN technology, it can be divided into different technologies which are wireless LANs
and Ad Hoc Networks. For wireless LANs, it allows greater portability and flexibility than the
traditional wired local area network “LAN” since it allows the users to connect remotely using
wireless card device which is usually built-in devices in laptops. For Ad hoc networks, they
are considered as a network designed to dynamically connect remote devices like cell phones
and laptop through Bluetooth technologies. This type of technology is considered as shifting
network topologies and maintain random network configuration whereas the WLANs use a
fixed network infrastructure (Lutui, Tete'Imoana, & Maeakafa, 2017).
Based on that, the wireless network provides and offers several benefits such as user mobility,
rapid installation, flexibility, and scalability. Because of these primary benefits, WLANs are
still gaining high popularity nowadays, and it becomes a compelling alternative to traditional
wired technology since it makes it easier for users to conduct their daily operations. Therefore,
wireless LAN technology offers a type of authentication services to verify the identity of the
Page 5 of 29
communicating clients that provides an access control mechanism to the network and deny any
client that cannot complete the authentication stage properly. The main aim of this research is
to study and discuss the main wireless security and IEEE 802.11 standards based on their
performance which includes throughput and delay, confidentially, integrity and availability.