Manifold Surveillance Issues in Wireless Network and the Secured Protocol

Manifold Surveillance Issues in Wireless Network and the Secured Protocol

Mamata Rath (Birla School of Management (IT), Birla Global University, Odisha, India), Bibudhendu Pati (Department of Computer Science, Rama Devi Women's University, Bhubaneswar, India) and Binod Kumar Pattanayak (Department of Computer Science and Engineering, Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, Odisha, India)
Copyright: © 2020 |Pages: 11
DOI: 10.4018/IJISP.2020010102
OnDemand PDF Download:
No Current Special Offers


With rapid growth of internet users and frequently emerging communication technology, the issues of using web as a worldwide platform and the requirement to design the smart applications to coordinate, discuss, register, and outline gradually emerges. Information transmission through a wireless network involves the radio signals, the arrangement of information packets, and the network topology. As each segment is correlated to each other, it is very essential to employ security mechanism in these components and real security control must be connected on them. Thus, security plays a critical factor in wireless network. This article highlights security issues in current wireless networks such as mobile ad-hoc network and IoT-supported networks and it also proposes a security-based S-RAID protocol design for security control in cluster based wireless networks. Simulation results show proficiency and better transmission rate of the proposal when it was compared with other similar approaches.
Article Preview


As wireless network is a centre innovation developed in new age, the essential security challenges incorporate consistent communication with unwavering quality in the network. In a wireless network with no foundation where there is no base station and access point, the possibility of defenselessness is more. The cell phones are allowed to move toward any path as yet keeping up network with other portable hubs. Because of this exceptional nature of wireless network, outline of wireless network convention with high security includes in particularly basic. Again, because of dynamic change in topology, the network change happens powerfully thus the network is decentralized and more defenseless than wired based network in numerous angles.

In a special wireless networks like WSN and Mobile Ad-hoc Network (MANET), electronic devices and gadgets such as tablets, PCs, mobile phones, machines with specially appointed correspondence capacity are connected together to make a system. MANET is a self-organizing structure of flexible switches related hosts associated by secluded connections. The routers move randomly and compose themselves accordingly; along these lines, the systems remote topology may change quickly and capriciously. In these type of network each node acts as router and because of dynamic changing topology the accessibility of hubs is not generally ensured. It likewise does not ensure that the way between any two hubs would be free of pernicious hubs. The remote connection between hubs is exceptionally vulnerable to connection assaults such as passive eavesdropping, active interfering, etc.Due to inflexibility in the infrastructure of it affects the security feature whenever any kind of extreme computation is done to perform encryption. So due to this problem it is important to build a secured connection which can provide high security solution to provide secured services like authentication, confidentiality, integrity, non-repudiation and availability. So here security is provided in each and every layer

Wireless networks have all around refreshing as of late because of its incredible highlights, for example, self configurable work stations called hubs and they themselves can do their own upkeep . There are many open security issues in wireless network, for example, its open design of network, its common medium, the issue of asset limitations, and alterable network topology. In the network layer of the network different attacks happens amid directing of the data packets from one station to other. There are some special attack types in which routing tables are changed, however, most of the attacks takes place on smart devices because there is very few security policy employed to protect them. Wireless networks have got well appreciated in recent years due to its fantastic features such as self configurable work stations called nodes and they themselves can do their own maintenance . There are many open security issues in wireless network such as its open architecture of network, its shared medium, the problem of resource constraints, and changeable network topology and real time applications[26].In the network layer of the network model various attacks takes place during routing of the packets from one mobile device to other. There are some forwarding attacks which leave the routing tables alone, but changes the delivery of packets. Due to any weakness of the design of the underlying protocol, many attacks happen as a result of which there is denial of service to authenticated devices and many other type of problems take place.

Basic motivation of our work is that we found various types of attacks in wireless transmission and then we proposed a security mechanism to prevent the wireless transmission from vulnerability and attacks. The article has been organised as follows. Section 2 describes Related work section. Section 3 describes security threats in wireless network. Section 4 describes mobile agent as a means of prevention of attack. Section 5 describes the proposed security protocol S-RAID. Section 6 describes comparative analysis and simulation results and at last section 7 concludes the paper.

Complete Article List

Search this Journal:
Open Access Articles
Volume 15: 4 Issues (2021): 1 Released, 3 Forthcoming
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing