Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges

Version 1 : Received: 30 September 2020 / Approved: 1 October 2020 / Online: 1 October 2020 (13:59:25 CEST)

How to cite: Eian, I.C.; Lim, K.Y.; Yeap, M.X.L.; Yeo, H.Q.; Z, F. Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges. Preprints 2020, 2020100018. https://doi.org/10.20944/preprints202010.0018.v1 Eian, I.C.; Lim, K.Y.; Yeap, M.X.L.; Yeo, H.Q.; Z, F. Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges. Preprints 2020, 2020100018. https://doi.org/10.20944/preprints202010.0018.v1

Abstract

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.

Keywords

Wireless networks, security vulnerabilities, privacy challenges, active attacks, passive attacks

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.