{"title":"Security Threats in Wireless Network Communication-Status, Challenges, and Future Trends","authors":"Ahmed Najah Kadhim, S. Sadkhan","doi":"10.1109/ACA52198.2021.9626810","DOIUrl":null,"url":null,"abstract":"The wireless air interface is open and accessible to both authorized and unauthorized users due to the broadcast nature of radio propagation. In a wired network, communication equipment is connected via wires, and a station without a direct link is unable to connect to the network for illicit reasons. Wireless transmissions are more vulnerable to malicious assaults than wired transmissions due to the open communications environment, which includes both passive and active attackers for disrupting valid signals. First, we’ll go through wireless network security needs. Following that, a complete review of security assaults in wireless networks is provided, with potential security risks examined at each protocol layer, in light of the network protocol design. Finally, certain technological problems that have yet to be overcome at the time of writing are outlined, as well as anticipated developments in wireless security.","PeriodicalId":337954,"journal":{"name":"2021 International Conference on Advanced Computer Applications (ACA)","volume":"29 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Advanced Computer Applications (ACA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACA52198.2021.9626810","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The wireless air interface is open and accessible to both authorized and unauthorized users due to the broadcast nature of radio propagation. In a wired network, communication equipment is connected via wires, and a station without a direct link is unable to connect to the network for illicit reasons. Wireless transmissions are more vulnerable to malicious assaults than wired transmissions due to the open communications environment, which includes both passive and active attackers for disrupting valid signals. First, we’ll go through wireless network security needs. Following that, a complete review of security assaults in wireless networks is provided, with potential security risks examined at each protocol layer, in light of the network protocol design. Finally, certain technological problems that have yet to be overcome at the time of writing are outlined, as well as anticipated developments in wireless security.