Emerging wireless networks are those that involve transmission of data and instructions through the air without any physical storage or medium. Using this technology, any individual can contact with another from anywhere in the world. Some of the most popular emerging wireless networks are wireless fidelity (Wi-Fi), Light Fidelity (Li-Fi), Gigabit Wireless (GiFi), WiMAX, ZigBee, RFID and others. These technologies use high speed wireless connection for transmission of messages and instructions [1]. Moreover, the fidelity technologies can be used to access high speed internet connection within a specific range. Although these technologies are extremely convenient for the users and save a lot of physical space, there are susceptible to security attacks. Emerging wireless networks have brought a revolution in the field of communication technology. Using this technology, any individual can contact with another from anywhere in the world. Wireless networks also help the users to send and receive different files and information from one device to another without any need of physical space or storage.
The security challenges of the emerging wireless technologies are discussed in this assignment.
With the inception of communication technology, there have been development of the communication network throughout the years. The initial communication networks involved transmission of communication messages from one place to another was done through wired connections [5]. Initially, there were short distance wires but then came long distance wires that were laid underground or overhead through thousands of kilometers. However, these connections were not sufficient for intercontinental communication system in which the continents were separated by oceans. In order to solve this problem, the developers invented the wireless network technology, which is the most widely used communication system in the world. The initial wireless networks involved networks in walkie-talkies, mobile phones, radios and others. However, in the current time, wireless networks find extensive use in different devices and communication connections. Some of the most popular emerging wireless networks are wireless fidelity (Wi-Fi), Light Fidelity (Li-Fi), Gigabit Wireless (GiFi), WiMAX, ZigBee, RFID and others [2]. These technologies use high speed wireless connection for transmission of messages and instructions. Moreover, the fidelity technologies can be used to access high speed internet connection within a specific range. Although these technologies are extremely convenient for the users and save a lot of physical space, there are susceptible to security attacks. The security challenges of the emerging wireless technologies are discussed in the following parts of the assignment.
There are many security challenges associated with wireless communication networks. Most of these security challenges involve breach of privacy and data. Due to the massive popularity of wireless networks, trillions of gigabytes of data are transmitted through wireless networks every day. The most important part is that of all the data, majority contains personal information of the users. Hence, network hackers target the wireless networks to steal the personal information and use them for illegal works including fraud and theft. Some of the common security challenges are as follows.
Data Breach – This is a case data breach where hackers use the wireless connections to reach the common central server and steal confidential information of users or business organizations. The users use the wireless connections to use the internet. Once they are connected to the internet, hackers from any part of the world can steal the information and data of the user [4]. They just use the wireless network connection to enter into the user’s system and access all the files and data stored in the server.
Bluetooth Attack – Some hackers can also attack a user’s system using Bluetooth connection without even accessing the internet. If the user is using the Bluetooth in a public place, some unethical hacker nearby can use hacking techniques to break into the user’s device via the Bluetooth connection [9]. Once the hacker enters the system, he can easily steal personal information of the user like address, phone numbers and credit card number and use them for unethical and criminal purposes.
Public Wifi Attack – This is a major security challenge for wifi connections that are open to public. Generally, in some popular community areas, free wifi connections are provided to the nearby people [2]. As a result, at a time, a large number of users are connected to the same network. This makes it easy for the hackers to break into a number of systems and steal the personal and confidential information from the users’ devices.
Jamming – This is another major challenger for wireless networks although it is quite rare and less beneficial for the hackers. In this case, the hacker sends numerous APs with deauthentication frames and floods the traffic in a specific server [1]. As a result, data streaming stops completely in this server. This is an unethical act taken by some organizations to break down the business operations and communication systems of the rival organizations.
Two examples for the data security breach through wireless network connections are as follows.
In this case, TJX, the owners of TKMaxx were targets of data breach attacks that were conducted through the wireless internet connections of the company. This company deals with the management of user’s credit cards. As a result of the attack, information for at least 45 million credit card users were stolen from the company’s database. The attack was done so securely and silently that it was discovered after a year of its occurrence. The hackers used the wireless wifi connections of the company to reach the central server where all the data regarding the credit cards were stored.
The case study is available in the following link:
https://sydney.edu.au/engineering/it/courses/info5990/Supplements/Week07_Malware&Security/Supp07-4TJXCaseDetails.pdf
Fast Food Franchise is a fast food retail chain that deals with the sale of hamburgers and other fast food in the southern parts of United States. Since they accept online payments from their customers, they store the credit and debit card information of a large number of customers. The hackers targeted their server and used their public wifi service in the stores to break into the server. After reaching the server, the hackers stole the information of the credit cards of the regular customers of the company.
The case study can be found in the following link:
https://www.netsurion.com/Corporate/media/Corporate/Files/Case%20Studies/2FastFoodFranchisecasestudy.pdf
Emerging wireless networks have brought a revolution in the field of communication technology. Using this technology, any individual can contact with another from anywhere in the world. Moreover, he can also know what is happening in the opposite part of the world without any difficulty. Wireless networks also help the users to send and receive different files and information from one device to another without any need of physical space or storage [7]. This technology also provide high speed services and have significantly reduced the waiting time that was required in the wired connections. Finally, the cost of laying and installation of wires for the wired connections have been successfully reduced by the wireless network connections.
Conclusion
In this assignment, emerging wireless network and its security challenges are discussed. Emerging wireless networks are those that involve transmission of data and instructions through the air without any physical storage or medium. Some of the most popular emerging wireless networks are wireless fidelity (Wi-Fi), Light Fidelity (Li-Fi), Gigabit Wireless (GiFi), WiMAX, ZigBee, RFID and others. These technologies use high speed wireless connection for transmission of messages and instructions. Moreover, the fidelity technologies can be used to access high speed internet connection within a specific range. Although these technologies are extremely convenient for the users and save a lot of physical space, there are susceptible to security attacks. Due to the massive popularity of wireless networks, trillions of gigabytes of data are transmitted through wireless networks every day. The most important part is that of all the data, majority contains personal information of the users. Hence, network hackers target the wireless networks to steal the personal information and use them for illegal works including fraud and theft. Hackers use the wireless connections to reach the common central server and steal confidential information of users or business organizations. Some hackers can also attack a user’s system using Bluetooth connection without even accessing the internet. Hence, suitable measures must be taken in order to prevent these security challenges for emerging wireless networks.
References
Cavallari, Riccardo, Flavia Martelli, Ramona Rosini, Chiara Buratti, and Roberto Verdone. “A survey on wireless body area networks: Technologies and design challenges.” IEEE Communications Surveys & Tutorials16, no. 3 (2014): 1635-1657.
Chilamkurti, Naveen, Sherali Zeadally, and Hakima Chaouchi, eds. Next-generation wireless technologies: 4G and beyond. Springer Science & Business Media, 2013.
Chin, Woon Hau, Zhong Fan, and Russell Haines. “Emerging technologies and research challenges for 5G wireless networks.” IEEE Wireless Communications21, no. 2 (2014): 106-112.
Da Xu, Li, Wu He, and Shancang Li. “Internet of things in industries: A survey.” IEEE Transactions on industrial informatics10, no. 4 (2014): 2233-2243.
He, Wu, Gongjun Yan, and Li Da Xu. “Developing vehicular data cloud services in the IoT environment.” IEEE Transactions on Industrial Informatics10, no. 2 (2014): 1587-1595.
Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. “Security of the Internet of Things: perspectives and challenges.” Wireless Networks20, no. 8 (2014): 2481-2501.
Liang, Chengchao, and F. Richard Yu. “Wireless network virtualization: A survey, some research issues and challenges.” IEEE Communications Surveys & Tutorials17, no. 1 (2015): 358-380.
Movassaghi, Samaneh, Mehran Abolhasan, Justin Lipman, David Smith, and Abbas Jamalipour. “Wireless body area networks: A survey.” IEEE Communications Surveys & Tutorials16, no. 3 (2014): 1658-1686.
Tehrani, Mohsen Nader, Murat Uysal, and Halim Yanikomeroglu. “Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions.” IEEE Communications Magazine52, no. 5 (2014): 86-92.
Wan, Jiafu, Daqiang Zhang, Shengjie Zhao, Laurence Yang, and Jaime Lloret. “Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions.” IEEE Communications Magazine52, no. 8 (2014): 106-113.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download