the blog

Latest news.

NIT6130 INTRODUCTION TO RESEARCH

1.      Introduction

With the persistent advancement of innovation, together with the cost/increment in execution preferences, wireless network is progressively actualized in workplaces and open spaces. This report breaks down the dangers and security dangers related with wireless systems and portray an arrangement of best practices for actualizing remote systems in corporate and home situations. At long last, an arrangement of security tips is accommodated end clients perusing the Internet utilizing open remote systems.

 

2.      Broad Scan

2.1 Research Journal

 

Date Task Action Comment
Literature review

 

1.      Liang, C., & Yu, F. R. (2015). Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380.

2.      Shinde, R., & Awasthi, H. M. (2015). U.S. Patent No. 9,148,422. Washington, DC: U.S. Patent and Trademark Office.

 

These books efficiently lies down the various impacts of wireless network security7, their respective challenges their uses and also the future that it holds when implemented widely.

Table 1 Reasearch journals

2.2 Filing System

 

Source Keywords Used No of Returned Literature No of collected literature
Google Scholar “Wireless Network system” 356 3
“Wireless Network Security Challenges and Solution” 392 4

        Table 2 Filing system

2.3 Bibliographic file from broad scan

Bandekar, A., & Javaid, A. Y. (2017, July). Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices. In 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER) (pp. 1631-1636). IEEE.

Jelicic, V., Magno, M., Brunelli, D., Bilas, V., & Benini, L. (2014). Benefits of wake-up radio in energy-efficient multimodal surveillance wireless sensor network. IEEE Sensors Journal, 14(9), 3210-3220.

Karaoguz, J., & Seshadri, N. (2015). U.S. Patent No. 9,014,196. Washington, DC: U.S. Patent and Trademark Office.

Liang, C., & Yu, F. R. (2015). Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380.

Maltsev, A., Sadri, A. S., Sergeyev, V., & Davydov, A. (2017). U.S. Patent No. 9,692,459. Washington, DC: U.S. Patent and Trademark Office.

Prakasha, K., Muniyal, B., Acharya, V., & Kulal, A. (2016, September). Secure and Efficient User Authentication Using Modified Otway Rees Protocol in Distributed Networks. In The International Symposium on Intelligent Systems Technologies and Applications (pp. 297-302). Springer, Cham.

Shinde, R., & Awasthi, H. M. (2015). U.S. Patent No. 9,148,422. Washington, DC: U.S. Patent and Trademark Office.

3.      Focused Review

3.1 Updated filing system

Source Keywords Used No of Returned Literature No of collected literature
Google Scholar “Wireless Network system” 356 3
“Wireless Network Security Challenges and Solution” 392 4

Table 3: Focused review filing system

3.2 Updated bibliographic file from focused review

Bandekar, A., & Javaid, A. Y. (2017, July). Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices. In 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER) (pp. 1631-1636). IEEE.

Jelicic, V., Magno, M., Brunelli, D., Bilas, V., & Benini, L. (2014). Benefits of wake-up radio in energy-efficient multimodal surveillance wireless sensor network. IEEE Sensors Journal, 14(9), 3210-3220.

Karaoguz, J., & Seshadri, N. (2015). U.S. Patent No. 9,014,196. Washington, DC: U.S. Patent and Trademark Office.

 

Maltsev, A., Sadri, A. S., Sergeyev, V., & Davydov, A. (2017). U.S. Patent No. 9,692,459. Washington, DC: U.S. Patent and Trademark Office.

Prakasha, K., Muniyal, B., Acharya, V., & Kulal, A. (2016, September). Secure and Efficient User Authentication Using Modified Otway Rees Protocol in Distributed Networks. In The International Symposium on Intelligent Systems Technologies and Applications (pp. 297-302). Springer, Cham.

 

4.      Selected Paper 1

In this paper of Liang & Yu (2016) has aptly embedded the potential of the wireless network security and some issues that need to be resolved so as to be used in much more wide scales.

4.1  Problem Definition

Wireless local area network security (WLAN security) is a security framework intended to shield systems from security ruptures to which remote transmissions are subject. This kind of security is essential since WLAN signals have no restrictions on physical points of confinement and are liable to ill-conceived access to organize assets, which results in the weakness of private and secret information. System activities and accessibility can likewise be imperiled on account of a WLAN surveillance camera. Low execution costs make most wireless systems appealing to clients. In any case, the simple the accessibility of minimal effort hardware likewise offers assailants the apparatuses to dispatch assaults on the system.

 

4.2  Running Example

The outline absconds in the security instruments of the 802.11 standard convert into a progression of conceivable assaults, aloof and dynamic. These assaults enable gatecrashers to spy or mess with remote transmissions.

  • SHARED KEY AUTHENTICATION FLAW

Shared key confirmation can be effortlessly misused by a detached assault of keeping an eye on the test and the reaction between the passageway and the verification customer. Such an assault is conceivable on the grounds that the aggressor can catch both plain content (the test) and the scrambled content (the appropriate response). WEP thus uses the RC4 encryption stream as a calculation for encryption. An encryption of the stream works from produce a stream of keys that is a succession of pseudo-irregular bits, in view of the mutual mystery key, alongside an initialization vector (IV). The key stream is thus XORed against the level content to create the encoded content. A vital property of a stream code is that if both clear content and encoded content are known, the key stream can basically be recovered XORING the plain content and the cipher text together, for this situation the test and the  reply. The recuperated key chain can be utilized by the programmer to scramble any next test content created by the passage to deliver a legitimate confirmation answer the XORing of the two qualities together. Therefore, the aggressor can be confirmed at the passage (Prakasha et al., 2016).

  • “PARKING LOT” ATTACK

Access point radio flags in a round pattern, and these signals quite often reach out past the physical furthest reaches of the region they mean to cover. Signs can be blocked outside structures, or even through floors of multi-story structures. Accordingly, assailants can execute a “parking” assault, where they sit in the association’s parking garage and attempt to get to inward has through the remote system (Bandekar & Javaid, 2017).

  • SERVICE SET IDENTIFIER FLAW

Access points have predefined SSIDs. In the event that the default SSID isn’t transformed, it will draw in a generally more noteworthy number of assaults from aggressors, as these units are thought about gadgets with mistaken design. What’s more, SSIDs are installed in administration systems that will be issued in plaintext, paying little mind to whether the passage is designed to impair SSID transmission or encryption empowered. When playing out an examination of the air-gained arrange activity, the aggressor can get the SSID of the system and play out different assaults.

4.3  Overview of the Proposed System

Wireless networks are compelling associations to totally reevaluate how they ensure their systems and gadgets to counteract assaults and abuse of introduction to basic assets and delicate data. By their exceptionally nature, remote systems are hard to actualize, ensure and oversee, notwithstanding for the most experienced system chairmen.

Wireless networks offer extraordinary abuse potential for two reasons; they utilize radio waves for correspondence and remote PCs are pervasive. To benefit as much as possible from security arranging, organizations must spotlight on the dangers that represent the most serious hazard. Wireless networks are powerless in a bunch of routes, the absolute most plausible issues are untrustworthy passageways and the utilization of cell phones by workers without satisfactory security insurances, however endeavors at hacking and denial-of-service ( DoS) are surely conceivable.

The extra security difficulties of wireless access are accomplished using representative empowered remote gadgets, the developing measure of touchy information living in such gadgets, and the simplicity with which end clients can take part in hazardous remote conduct. The estimation of network for the most part beats security issues, as clients need to carry out their occupations at home or out and about.

Several security measures taken for wireless security

Regardless of how great your router is, to have a protected network, you have to change the router’s default setup and arrange it accurately. Also using several of the protocols that are being recently used in order to protect the data and the network gives a much larger extent to wireless security. Some of the protocols are:

  • Using Encryption protocols.
  • Using WPA that is the Wi-Fi protected access to improve the security feature even further.
  • Using the WPA2 adds more to the security list.
  • Using filtering of MAC address.
  • Effectively controlling the signal strength of a router in a wireless network.

4.4  System Architecture

The wireless network system is a system arranged utilizing the recurrence of the radio flag to impart amongst PCs and other system gadgets. It is once in a while otherwise called Wi-Fi or WLAN. This system is getting to be well known today on account of its simple design work and does not require wiring. You can interface PCs anyplace in your home without links. Two of the main components in wireless network are a wireless router and a wireless client. Given below is a description of how a wireless network will look like:

Figure 1: Implementation of wireless network system

Though in accordance with the IEEE 802.11 standards there specifically exists two main operating modes in wireless network. They are:

Ad hoc mode: It is utilized to associate remote customers specifically, without the requirement for a remote switch or passage. A specially appointed system comprises of up to 9 remote customers, which send their information specifically to each other.

Infrastructure mode: It is utilized to interface PCs with remote system connectors, otherwise called remote customers, to a current wired system with the assistance of the remote switch (Liang & Yu, 2015).

 

 

5        Selected Paper 2

This paper of Shinde & Awasthi(2015), conducts an experiment and helps to understand the measures which could prevent the issues that are being faced by the wireless network security implemented in the organizations.

Network security is a combination of numerous levels of protections in the system and in the network. Strategies and controls are executed by each level in the network to provide extreme security. Access to the networks is only acquired by approved clients, while malevolent characters are viably obstructed to perform dangers and endeavors (Shinde & Awasthi, 2015). The world has been changed today through digitization, which has caused changes in the entirety of our day by day exercises. It is basic that all associations secure their systems on the off chance that they are to give the administrations required by representatives and clients. This eventually ensures your association’s notoriety. With programmers expanding and getting to be more quick witted step by step, the need to utilize arrange security turns out to be progressively barren.

Types of network security that is available nowadays are:

  • Application Security
  • Firewalls
  • Antivirus software
  • Antimalware software
  • Security Information and Event Management (SEEM)
  • Wireless Security
  • Virtual Private Network, etc.

5.1  Architecture of the solution

Network architecture defines the necessary components and the protocols in order to satisfy the requirements of the applications. One of the most popular standards that is used to demonstrate the architecture of the network is the OSI Reference model. It is used to demonstrate the wireless network’s interoperability.

Figure 2: Architecture of the solution

5.2  Experiments

The principle targets of this examination were to guarantee that VoIP calls could be set up and kept up effectively on UAV-based passages and that calls were not disposed of amid an exchange technique. To this end, it is an analysis led through which rehashed tests are directed with the Raspberry Pis and AP radios that were controlled by battery packs, which were all connected to the underside of unmanned elevated vehicles. The examination depicts the setup of the test, and in addition the outline contemplation; tests led in a controlled situation and in shut conditions to check the strategy and give a premise to outside test outcomes; and tests when the system was noticeable all around and its outcomes.

Figure 3: Proposed Model

5.3 Result

Prior to testing the execution noticeable all around, a field test was performed to check that the system was designed effectively. The system has been arranged similarly, aside from with the Raspberry Pis associated with the UAV. This test would likewise give a thought of the proper separations for the elevated trial, since the free flat separation between unmanned ethereal vehicles and clients ought to make an interpretation of consummately into the vertical separation to the outside. In this manner, the UAVs with the Raspberry Pi, reception apparatuses and battery packs are put toward one side of a long hallway inside a grounds building. Along these lines, the situating of the Zoiper base station switch, server and OSX customers empowered in the UAV hall. At that point InSSIDer (WiFi filtering programming) is utilized to quantify the flag quality of the UAV-mounted switch at 50-foot interims. The outcomes are appeared in the table below:

Distance (feet) Signal strength (dBm)
50 -46
100 -50
150 -65
200 -70

Table 4 : Experimental Data

 

Altitude >Signal strength Received Datagrams (%)
50 -45 76
100 -50 90

Table 5 Results in flight

 

5.4  Discussion

There are various types of wireless network available now. Some of them are:

  • Personal area network (PAN): It is the interconnection of IT gadgets inside a solitary individual, normally inside a range of 10 meters. For instance, a man going with a workstation, an individual computerized right hand (PDA) and a convenient printer could interconnect them without connecting anything, utilizing some sort of remote innovation. Normally, this sort of close to home system can likewise be interconnected remotely to the Internet or different systems.
  • Local Area Network (LAN): It is a network of PC that covers a generally little territory. By and large, a LAN is constrained to a private room; construction or infrastructures, a LAN can be linked with numerous number of LANs at any parting with the help of phone lines and radio waves.
  • Metropolitan area network (MAN): It is also like a local area network, yet covers a whole city or a grounds. Metropolitan area networks are framed by interfacing numerous LANs. Thus, Metropolitan area networks are bigger than LANs however littler than geographic systems. The Metropolitan area networks are amazingly productive and give fast correspondence through rapid administrators, for example, fiber-optic links.
  • Wide area network (WAN): It is regarded as a network for communication that covers a tremendous land territory, for example, urban areas, states or nations. They can be private to associate parts of an organization or they can be more open to interface littler systems. The simplest method to comprehend what a WAN is to think about the Internet all in all, which is the biggest, WAN on the planet (Maltsev et al., 2017).

Benefits of Wireless network:

  • The principle preferred standpoint of a wireless network on a wired system is that clients can move uninhibitedly inside the network zone with their PCs, versatile gadgets, and so on and get an Internet association.
  • Clients can likewise impart documents and different assets to different gadgets associated with the system without being associated with an entryway.
  • Quickly exchanging data on informal communities turns out to be considerably less demanding. For instance, taking a photo and transferring it to Facebook should be possible considerably speedier with remote innovation.
  • On the off chance that you own an organization like a coffee shop, having a wireless system installed that clients can access can present to you an extra business. Clients by and large love remote systems since they are helpful.
  • Wireless systems can here and there handle more clients since they are not constrained by a particular number of association ports (Jelicic et al., 2014).

6        Conclusion

To guarantee compelling and mechanized wireless danger insurance, organizations and government associations should actualize a far reaching remote security arrangement that covers the whole organization’s assets and empower them to find vulnerabilities, evaluate dangers, avert assaults, and guarantee proceeded with consistence , in the most secure and simplest approach to utilize and productively accessible. IT offices must have a preventive activity intend to forestall malignant assaults and abuse of representatives that trade off an association’s information protection and implement security approaches for remote utilize, both inside and outside the association. Notwithstanding whether an organization has approved the utilization of remote innovation or has a “no remote” strategy, its systems, information, gadgets and clients are uncovered and in danger.

 

 

 

7        References

Bojarski, M., Del Testa, D., Dworakowski, D., Firner, B., Flepp, B., Goyal, P., … & Zhang, X. (2016). End to end learning for self-driving cars. arXiv preprint arXiv:1604.07316.

Brynjolfsson, E., Rock, D., & Syverson, C. (2017). Artificial intelligence and the modern productivity paradox: A clash of expectations and statistics. In Economics of Artificial Intelligence. University of Chicago Press.

Gunning, D. (2017). Explainable artificial intelligence (xai). Defense Advanced Research Projects Agency (DARPA), nd Web.

Kim, Y. J., & Hong, J. S. (2015). Urban traffic flow prediction system using a multifactor pattern recognition model. IEEE Transactions on Intelligent Transportation Systems, 16(5), 2744-2755.

Mittal, P., & Singh, Y. (2016). Development of intelligent transportation system for improving average moving and waiting time with artificial intelligence. Indian Journal of Science and Technology, 9(3).

Rigas, E. S., Ramchurn, S. D., & Bassiliades, N. (2015). Managing Electric Vehicles in the Smart Grid Using Artificial Intelligence: A Survey. IEEE Trans. Intelligent Transportation Systems, 16(4), 1619-1635.

Sładkowski, A., & Pamuła, W. (Eds.). (2016). Intelligent transportation systems-problems and perspectives (Vol. 303). Springer International Publishing.

Wang, F. Y. (2017). Artificial intelligence and intelligent transportation: driving into the 3rd axial age with its. IEEE Intelligent Transportation Systems Magazine, 9(4), 6-9.

Wilson, S. K., & Benson, R. E. (2016). U.S. Patent No. 9,429,943. Washington, DC: U.S. Patent and Trademark Office.

Wuthishuwong, C., Traechtler, A., & Bruns, T. (2015). Safe trajectory planning for autonomous intersection management by using vehicle to infrastructure communication. EURASIP Journal on Wireless Communications and Networking, 2015(1), 33.

Zhu, Q., & Azar, A. T. (Eds.). (2015). Complex system modelling and control through intelligent soft computations. Germany: Springer.

Author: