Version 1
: Received: 9 November 2023 / Approved: 9 November 2023 / Online: 9 November 2023 (16:13:31 CET)
How to cite:
Azam, H.; Tan, M.; Pin, L. T.; Syahmi, M. A.; Qian, A. L. W.; Jingyan, H.; Uddin, M. F.; Sindiramutty, S. R. Wireless Technology Security and Privacy: A Comprehensive Study. Preprints2023, 2023110664. https://doi.org/10.20944/preprints202311.0664.v1
Azam, H.; Tan, M.; Pin, L. T.; Syahmi, M. A.; Qian, A. L. W.; Jingyan, H.; Uddin, M. F.; Sindiramutty, S. R. Wireless Technology Security and Privacy: A Comprehensive Study. Preprints 2023, 2023110664. https://doi.org/10.20944/preprints202311.0664.v1
Azam, H.; Tan, M.; Pin, L. T.; Syahmi, M. A.; Qian, A. L. W.; Jingyan, H.; Uddin, M. F.; Sindiramutty, S. R. Wireless Technology Security and Privacy: A Comprehensive Study. Preprints2023, 2023110664. https://doi.org/10.20944/preprints202311.0664.v1
APA Style
Azam, H., Tan, M., Pin, L. T., Syahmi, M. A., Qian, A. L. W., Jingyan, H., Uddin, M. F., & Sindiramutty, S. R. (2023). Wireless Technology Security and Privacy: A Comprehensive Study. Preprints. https://doi.org/10.20944/preprints202311.0664.v1
Chicago/Turabian Style
Azam, H., Muhammad Fuhad Uddin and Siva Raja Sindiramutty. 2023 "Wireless Technology Security and Privacy: A Comprehensive Study" Preprints. https://doi.org/10.20944/preprints202311.0664.v1
Abstract
Since the advent of the Internet, there has been a significant shift from wired to wireless communication between devices. The volume of data transmitted has surged, primarily driven by the exponential growth of network services, Internet of Things (IoT) devices, and online users. This trend became especially pronounced with the onset of the COVID-19 pandemic, as the Internet's role and significance expanded dramatically. People began to spend more time online, engaging in activities like e-learning, remote work, and online shopping. Concurrently, concerns about the security of wireless communication channels have escalated. As more data is stored and transmitted over the Internet, cybercriminals are actively seeking unauthorized access to it to further their malicious objectives. Through a comprehensive literature review in the realm of wireless network security and privacy, it has become evident that several factors render these networks susceptible to vulnerabilities. The aim of this paper is to shed light on the major and common security and privacy challenges faced by existing wireless networks. Additionally, it seeks to demonstrate the array of techniques available to mitigate these issues. Ultimately, this paper will culminate in an in-depth analysis of cybersecurity measures to address the issues in wireless networks.
Keywords
Intrusion Prevention System (IPS); Intrusion Detection System (IDS); Intrusion Detection and Presentation System (IDPS); Deep Packet Inspection (DPI); Network-Based Prevention System (NIPS)
Subject
Computer Science and Mathematics, Computer Science
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.