A Survey On Wireless Technical Challenges
A Survey On Wireless Technical Challenges
Future Trends:
A survey of the wireless security challenges and defense mechanisms conceived for
protecting the authenticity, confidentiality, integrity, and availability of wireless
transmissions against malicious attacks. According to the latest statistics released by the
International Telecommunications Union in 2013, the number of mobile subscribers has
reached 6.8 billion worldwide and almost 40% of the world’s population is now using the
Internet.
Meanwhile, it has been reported in that an increasing number of wireless devices are
abused for illicit cyber-criminal activities, including malicious attacks, computer hacking,
data forging, financial information theft, online bullying/stalking and so on. Security
threats and vulnerabilities associated with these protocol layers are typically protected
separately at each layer to meet the security requirements, including the authenticity,
confidentiality, integrity and availability. For example, cryptography is widely used for
protecting the confidentiality of data transmission by preventing information disclosure to
unauthorized users.
Furthermore, wireless communications sessions may be readily overheard by an
eavesdropper, as long as the eavesdropper is within the transmit coverage area of the
transmitting node. In order to maintain confidential transmission, existing systems
typically employ cryptographic techniques for preventing eavesdroppers from
intercepting data transmissions between legitimate users. Again, in wireless networks, the
information is exchanged among authorized users, but this process is vulnerable to
various malicious threats owing to the broadcast nature of the wireless medium. The
security requirements of wireless networks are specified for the sake of protecting the
wireless transmissions against wireless attacks, such as eavesdropping attack, DoS attack,
data falsification attack, node compromise attack and so on.
Wireless networks that includes Bluetooth, WIF, WI-MAX, Long Term Evolution (LTE).
Upcoming Trends:
This section presents a range of challenging open issues and future directions for
wireless security research.
Mixed attacks in wireless networks.
Joint optimization of security, Reliability, and Throughput.
Cross-Layer wireless security design and analysis.
Physical-Layer Security for the emerging 5G systems.