Version 1
: Received: 30 September 2020 / Approved: 1 October 2020 / Online: 1 October 2020 (13:59:25 CEST)
How to cite:
Eian, I. C.; Lim, K. Y.; Yeap, M. X. L.; Yeo, H. Q.; Z, F. Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges. Preprints2020, 2020100018. https://doi.org/10.20944/preprints202010.0018.v1
Eian, I. C.; Lim, K. Y.; Yeap, M. X. L.; Yeo, H. Q.; Z, F. Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges. Preprints 2020, 2020100018. https://doi.org/10.20944/preprints202010.0018.v1
Eian, I. C.; Lim, K. Y.; Yeap, M. X. L.; Yeo, H. Q.; Z, F. Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges. Preprints2020, 2020100018. https://doi.org/10.20944/preprints202010.0018.v1
APA Style
Eian, I. C., Lim, K. Y., Yeap, M. X. L., Yeo, H. Q., & Z, F. (2020). Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges. Preprints. https://doi.org/10.20944/preprints202010.0018.v1
Chicago/Turabian Style
Eian, I. C., Hui Qi Yeo and Fatima Z. 2020 "Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges" Preprints. https://doi.org/10.20944/preprints202010.0018.v1
Abstract
In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.
Keywords
Wireless networks, security vulnerabilities, privacy challenges, active attacks, passive attacks
Subject
Computer Science and Mathematics, Computer Science
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.