Studyspark Study Document

Security in Communication Challenges Research Paper

Pages:10 (2871 words)

Sources:11

Subject:Technology

Topic:Wireless Communication

Document Type:Research Paper

Document:#73429324


Chapter 1: Introduction

Wireless communications are, to any extent, the most rapidly growing section of the communications sector. For this reason, it has seized the consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et al., 2018). In the past decade, cellular communications systems have faced exponential growth and development and there exist billions of users all over the globe. Statistics indicate that by the culmination of 2018, there were approximately 5.1 billion individuals across the globe that subscribed to mobile services, and this signified approximately 67 percent of the world’s populace. Furthermore, the statistics indicate that more than 60 percent of the population in the world has accessibility to internet (GSMA, 2019).

In delineation, wireless communication takes into account the transmission of message signals through minimal energy radio frequency waves by utilizing open air, with the media aspect including both a transmitter and a receiver. The message signal is conveyed to the nearby antenna spot and is transported via optic-fiber cable to a wired telephone or via radio signal to a different wireless phone. Notably, the vulnerable and open nature of wireless communications networks causes wireless transmissions to be substantially more susceptible to different malicious attacks by impostors. This varies from identity theft, eavesdropping to interrupt data, violating the rights for privacy, denial-of-service attacks, to incorporation of viruses, Trojan horse and other mischievous codes to interrupt valid transmissions, and jamming attacks (Ijemaru et al., 2018). What is more, imposters and trespassers have the ability to incapacitate or deactivate firewall protection to attain accessibility to private and sensitive data and information that is conveyed between two wireless communication devices, in the event that this sort of information is not properly safeguarded by strong and comprehensive encryption. As a result, this points out the significant necessity to enhance security in wireless communication, in order to deal with cybercriminal actions, bearing in mind that at the present moment, progressively more individuals are utilizing wireless communication networks in the home and workplace settings (Ijemaru et al., 2018).

Chapter 2: Literature Review

The enormous worldwide infrastructure does not have any fundamental security mechanisms that are embedded to safeguard itself. As a result, it is set for incredible sharing on both levels of insignificance and extreme necessity and therefore the need for security in communication network technologies is paramount to preclude incessant threats (Jain, 2013). Communication network security is a conception to safeguard both network and data transmission over wireless network. Imperatively, data security is the key element of secure transmission of data over communication networks that are undependable (Jain, 2013). In the contemporary, security is a challenging aspect of data communications that encompasses numerous areas comprising of safe and secure communication challenges, strong data encryption techniques, as well as trusted third party to sustain the database. Security has developed into a significant issue in communications. The necessity for communication network security is mounting on a day to day basis. The fundamental reasons for such security include conducting business, proper communication and safety in prospectively unsafe environments and also the development and execution of enterprise-wide communication security policies (Jain, 2013). The purpose of this paper is to comprehensively examine security in communication technologies.

Wireless security encompasses any initiatives taken that preclude unwarranted access or damage to information that is transmitted over wireless networks in addition to making certain that both the privacy and veracity of data are not compromised (Ijemaru et al., 2018). At the present moment, most of the security architecture that are existent have faced a great deal of compromise owing to the actuality that the airwaves are susceptible to prying and meddling from any individual with radio frequency antenna. Consequently, this has made it significantly challenging to attain complete and total security over wireless communication systems (Ijemaru et al., 2018). There are several security susceptibilities and shortcomings linked with wireless communication networks.

Based on research conducted by Laeeq (2011), the survivability of wireless communications is associated to the protection mechanism of wireless communications and toughness or strength against attacks and failure of network components or communication in its own. These issues comprise of the Wireless Sensor Network gateway forming a sole point of interruption for the back-to-back sensor network infrastructure. Secondly, subsequent to the deployment of the communication network, the sensor nodes continue to remain unattended to, which is a fundamental cause of security lapses. The prevailing approaches for location tracking have their own limitations in being able to trace wireless imposters. Another issue is that key threats and challenges of wireless communications are still not taken into consideration with respect to revised specification. Finally, there is also the issue that the deployment of Ad-hoc Wireless Sensor Networks for the purposes of monitoring and checking physical environments continue to be positioned in susceptible zones (Laeeq, 2011).

There are five areas of wireless system security that can be taken into consideration. The first security issue in wireless communication is anonymity. This is the state of not being recognizable or distinguishable within a group of principles. The information regarding a certain individual or entity is sensitive and private and is confined solely to the individual who has the rights and authority to gain accessibility to it. Sustaining anonymity is of great worry…

Some parts of this document are missing

Click here to view full document

…signal at terminal T3. Imperatively, the degradedness of the signal can be employed at terminal T1 to preclude terminal T3 from gaining a clear comprehension of the content within the media being conveyed. Cryptographic security solutions executed at application layer entirely disregard these effects and function as though the eavesdropper channel is channel that is free of any errors or mistakes. On the other hand, the fundamental conception of physical-layer security is to clearly take into consideration dissimilarities at the PHY layer to in order to better safeguard the messages interchanged over the main channel (Bagheri-Karam, 2010).

Chapter 4: Conclusion

In spite of the major benefits offered by wireless communications networks, for instance, flexibility, greater productivity, portability, cost-effective installation expenses, roaming proficiencies and numerous more, the security aspect of wireless communication networks has continued to be of massive challenge and worry. In the contemporary setting, wireless communication susceptibilities are on the rise as a result of greater demand levels for greater data rates, the necessity for advanced and progressive services and that of roaming, and the massive disposition of services all over the world. As a consequence, this has generated severe challenging issues in the security of communication wireless systems and the applications in wireless communications settings.

Parenthetically, wireless communication networks and handheld devices are subject to the similar level of susceptibilities and risks with that of conventional wired networks. Nevertheless, in this day and age, the risks and threats linked with wireless communication networks have evolved to a new facet, apparently for the reason that the communication medium, the airwave, of wireless networks is wide open to trespassers, who exploit and misuse that to unveil malevolent attacks for instance denial-of-service attacks, identity theft, abuse of privacy rights, inclusion of viruses or mischievous codes to interrupt and mess up the normal tasks, passive eavesdropping for data interference and active jamming attacks to disturb authentic transmissions. Yet again, impostors also circumvent firewall protection to attain accessibility to private and sensitive data that is communicated between two wireless devices.

In regard to methodology purposed to combat this wireless communication security is the physical layer security. Imperatively, security solutions are dealt with in dissimilar layers. For instance, spread-spectrum modulation methods are utilized at the PHY layer to alleviate jamming of any communication channels, authentication instruments are carried out at the link layer to preclude unsanctioned or unwarranted accessibility, and cryptographic message encryption is carried out at the application layer to safeguard any data and information being conveyed against eavesdropping. For that reason, jamming of communication channels and unsanctioned accessibility, which are susceptibilities at the PHY layer and link layer, correspondingly,…


Sample Source(s) Used

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from: http://users.jyu.fi/~timoh/TIES327/WPLS.pdf

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from: https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Communication Challenges in Response to Disasters Communication

Pages: 4 (1413 words) Sources: 2 Subject: Terrorism Document: #22886264

Communication Challenges in Response to Disasters Communication Communication and response to disaster The United States has been hit by several disasters ranging from natural ones to man made. Some of them have included flooding, winds, and terrorism among others. In response to these disasters, the law enforcement agencies have been met with several challenges including communication problems due to failure of early preparedness or poor equipment. The most known natural one was Hurricane Katrina

Studyspark Study Document

Communications Failure to Communicate Effectively

Pages: 7 (2011 words) Sources: 1+ Subject: Communication Document: #12839630

This incident is evidence that the communications systems between all of the agencies are not linked in a way that is appropriate or helpful to ensuring that the citizens of the United Sates are safe. This failure of the agencies to effectively communicate with one another must be remedied to ensure that terrorist activities do not occur in the future. Recommendations It is imperative that businesses understand the vital role that

Studyspark Study Document

Security Issues of Online Communities

Pages: 60 (15576 words) Sources: 1+ Subject: Education - Computers Document: #35642606

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Studyspark Study Document

Security Analysis in the UK

Pages: 8 (2541 words) Sources: 15 Subject: Security Document: #92583051

Security Report In the present day, organizations are reliant on information in order to continue being relevant and not become obsolete. To be specific, organizations are reliant on the controls and systems that have been instituted in place, which provide the continuing privacy, veracity, and accessibility of their data and information (Lomprey, 2008). There is an increase and rise in threats to information contained within organizations and information systems (Lomprey, 2008).

Studyspark Study Document

Challenges Facing Multinational Companies

Pages: 2 (587 words) Sources: 4 Subject: Literature - Latin-American Document: #17653601

Human Resource Challenges Facing Multinational Entities Human Resource Challenges American Companies in Venezuela Encounter To remain competitive, U.S. firms, and indeed other global firms, have found it necessary to venture to other markets. Although, there are numerous benefits to be reaped from such a move, global companies often have to contend with a number of challenges. Some of these challenges have got to do with the hiring of both local and expatriate

Studyspark Study Document

Communication Non-Verbal Communication the Show

Pages: 2 (742 words) Subject: Communication Document: #38751740

They interacted with a blonde-haired woman who did not want to give up her phone. She was a typical "ditzy" blonde who had no idea what she would do for three hours without her phone. The scene was meant to add some comic relief, but it was still played with the same kind of unemotional intensity that the other detectives had. These people are supposed to be serious about

Join thousands of other students and

"spark your studies".