Privacy and Security of Wireless Communication Networks

Wireless networks are inherently more vulnerable than their wired counterparts. In addition, complications arise in the presence of node mobility and dynamic network topology. Moreover, intermittent connectivity, whether caused by mobility or periodic node sleep, brings about additional challenges. At the same time, node resource constraints make direct adoption of existing security solutions difficult, if not impossible. Wireless Communication Network Security and Privacy analyze important problems in the realms of wireless networks and mobile computing. The Security aspects relate to authentication, access control and authorization, nonrepudation, privacy and confidentiality, integrity, and auditing. Privacy is an essential feature of any product or service. WIRELESS COMMUNICATION NETWORKING AND TECHNOLOGIES Wireless communications have become a very interesting sector for the provision of telecommunication services. Mobile networks are available almost anytime and anywhere. The popularity of wireless handheld devices is high. The services offered are strongly increasing. They vary from simple communication services to applications for special and sensitive purposes such as electronic commerce, medical services and digital cash (Thurwachter, 2002). Due to low cost, low power consumption, flexible, no physical infrastructure and easy to deploy, wireless communications have been an admired research area over the past few years with tremendous growth in the population of wireless users. Nowadays, there are number of wireless technologies on hand for long range applications like cellular mobile, satellite communications, Radio Frequency (RF), and short range applications such as Bluetooth, Infrared (IR), Near Field Communication (NFC), ZigBee, Ultra Wide Band (UWB). These short range wireless technologies are being used in many wireless networks like Sattar B. Sadkhan University of Babylon, Iraq Nidaa A. Abbas University of Babylon, Iraq

[1]  E. D. Sciascio,et al.  Mobile Computing and Wireless Networks : Concepts , Methodologies , 2016 .

[2]  Mohey M. Hadhoud,et al.  Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..

[3]  Martin Fleury,et al.  Streaming Media with Peer-to-Peer Networks: Wireless Perspectives , 2012 .

[4]  M. Kamba The Influence of Social Networking and Library 2.0 as a Gateway for Information Access and Knowledge Sharing in Africa , 2016 .

[5]  Han-Chieh Chao,et al.  Survey of Cross-Layer Optimization Techniques for Wireless Networks , 2010 .

[7]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[8]  C. Sreedhar,et al.  POTENTIAL SECURITY ATTACKS ON WIRELESS NETWORKS AND THEIR COUNTERMEASURE , 2010 .

[9]  Fawzy Soliman Business Transformation and Sustainability through Cloud System Implementation , 2014 .

[10]  Cristina Comaniciu,et al.  Wireless Networks: Multiuser Detection in Cross-Layer Design , 2005 .

[11]  Robert Boncella Wireless Security: An Overview , 2002, Commun. Assoc. Inf. Syst..

[12]  Sanjeev Jain,et al.  A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.

[13]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[14]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[15]  Putra Sumari,et al.  An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications , 2010, ArXiv.

[16]  Ahmet Turan Özcerit,et al.  Performance evaluation of scalable encryption algorithm for wireless sensor networks , 2010 .

[17]  Keiji Tachikawa,et al.  W-CDMA Mobile Communication Systems , 2002 .

[18]  Olakanmi O.O RC4c : A Secured Way to View Data Transmission in Wireless Communication Networks , 2012 .

[19]  Md. Abdul Matin Developments in Wireless Network Prototyping, Design, and Deployment: Future Generations , 2012 .

[20]  Joakim Persson,et al.  Bluetooth Security , 2004 .

[21]  Zhi Ning Chen,et al.  Ultra Wideband Wireless Communication , 2005 .

[22]  Reza Curtmola,et al.  Secure network coding for wireless mesh networks: Threats, challenges, and directions , 2009, Comput. Commun..

[23]  Mohammad Reza Meybodi,et al.  User Based Call Admission Control Algorithms for Cellular Mobile Systems , 2010 .

[24]  Aftab Ahmad Wireless and Mobile Data Networks: Ahmad/Wireless and Mobile Data Networks , 2005 .

[25]  Mischa Schwartz,et al.  Mobile Wireless Communications: Access and scheduling techniques in cellular systems , 2004 .

[26]  Asrar U. H. Sheikh,et al.  Spectrum Access and Sharing for Cognitive Radio , 2012 .

[27]  Hsiao-Hwa Chen,et al.  The Next Generation CDMA Technologies , 2007 .

[28]  Arash Habibi Lashkari,et al.  A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[29]  Zhi Ning Chen,et al.  Ultra Wideband Wireless Communication: Arslan/Ultra Wideband Wireless Communication , 2006 .

[30]  Qusay H. Mahmoud,et al.  Cognitive Networks: Towards Self-Aware Networks , 2007 .

[31]  Sasan Adibi,et al.  Quality of Service Architectures for Wireless Networks: Performance Metrics and Management , 2010 .

[32]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.