Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Security and Privacy Issues in Wireless Networks

Version 1 : Received: 21 August 2020 / Approved: 24 August 2020 / Online: 24 August 2020 (09:53:30 CEST)

How to cite: Azhar, N.F.; Ngoo, Q.J.; Kim, T.H.; Dozono, K.; tuz Zahra, F. Security and Privacy Issues in Wireless Networks. Preprints 2020, 2020080523. Azhar, N.F.; Ngoo, Q.J.; Kim, T.H.; Dozono, K.; tuz Zahra, F. Security and Privacy Issues in Wireless Networks. Preprints 2020, 2020080523.


Communication between devices has transitioned from wired to unwired. Wireless networks have been in use widely around the globe since the advent of smartphones, IoT devices and other technologies that are compatible with wireless mode of communication. At the same time security issues have also increased in such communication methods. The aim of this paper is to propose security and privacy issues of the wireless networks and present them through comprehensive surveys. In context of security issues, there are 2 typical DDoS attacks - HTTP flood and SYN flood. Other than DDoS attacks, there are several other threats to wireless networks. One of the most prevalent include security issues in Internet of Things. In terms of privacy issues in a wireless network, location-based applications, individual data, cellular network and V2G (Vehicle to Grid) network are surveyed. The survey is hosted using questionnaire and responses of 70 participants is recorded. It is observed from the survey results that many groups of people lack the knowledge of security and privacy of wireless technologies and networks despite their increased use, however, students are relatively more aware and have strong knowledge of those issues. It is concluded from the results that an effective solution to these problems can be hosting campaigns for spreading the security and privacy laws to help the groups of people who are lagging behind in this domain of knowledge become more aware. A unique solution is also presented to overcome the security issues which include implementation of detection and mitigation techniques, implementing Blockchain in the IoT devices and implementing fog computing solutions. The unique solutions to overcome the privacy issues are proposed in the form of a privacy approach from the LBS server between pairs of users to increase the implementation of DSPM and blockchain as a solution.


Wireless networks and communication; security issues; HTTP flood attack; SYN flood attack; Internet of Things; blockchain


Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0

Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.