Call For Papers
Contact Us

  A Review of Challenges and Solutions of Wireless Security  
  Authors : Achi Ifeanyi Isaiah; Agwu Chukwuemeka Odi
  Cite as:


The need for wireless connectivity has increasingly become the order of the day because of the convenience it offers to the end users. As a result of this every individual, organizations, ministries and so have preference for it. To this end, in recent years, most devices come with wireless LAN [5] which enables them to see and get connected to an existing wireless network. The growing corporate appetite for Internet, intranet and wireless LAN services will drive the need for advanced information security services as technologies for circumventing network security systems continue to keep pace with the technologies designed to defend against them. Because of this ever increasing awareness and demand for wireless network, there is need to secure, safeguard this wireless network to ensure the authorized users are the ones gaining access to it. In this paper, we will deliberate on the challenges users encounter in securing a wireless network with wireless devices and the solutions.


Published In : IJCSN Journal Volume 3, Issue 4

Date of Publication : August 2014

Pages : 262 - 265

Figures : --

Tables : --

Publication Link : A Review of Challenges and Solutions of Wireless Security




Achi Ifeanyi Isaiah : Department Of Computer Science, Our Saviour Institute Of Science And Technology

Agwu Chukwuemeka Odi : Department Of Computer Science, Ebonyi State University-Abakaliki








Wireless LAN

Wired Equivalent Privacy





Wireless Security





All in all, the challenges and solutions of wireless security especially on mobile systems platform was discussed. Interestingly, it is a new area of research that is evolving as most corporate organization and individuals are embracing the wireless communication because of its’ latent qualities of ease of access, anytime, anywhere including not restricting the user to time. However, security in wireless systems still remains elusive. Nowadays users can get the complete wireless-security packages from vendors such as Cisco Systems and 3Com instead of piecing together various technologies to get the security they wanted. The impending release of Third Generation (3G) network technology, which would standardize TCP/IP on mobile systems, promises to permit strong, end-to-end SSL security, which functions only over IP networks. However, wireless security faces a number of hurdles, especially the challenge of adapting wireless technologies to work with the mobile world's more constrained resources. In spite of all the developments in fraud avoidance and detection, wireless fraud is expected to rise due to the rate at which wireless adoption in increasing. However, vendors and users alike hope that security will keep pace as other aspects of wireless technology continue to advance.










[1] P. Castro, P. Chiu, T. Kremenek, and R. Muntz, “A probabilistic room location service for wireless networked environments,” in Proc. 3rd Int. Conf. Atlanta Ubiquitous Computing (Ubicomp), vol. 2201, Sep. 2001,pp. 18–34.

[2] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proc. IEEE Symp. Res. Security and Privacy, May 2003, p. 197.

[3] L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, “Enhancing wireless location privacy using silent period,” in Proc. IEEE Wireless Commun. Netw. Conf., 2005, pp. 1187–1192.

[4] Y.-C. Hu and H. J. Wang, “Location privacy in wireless networks,” in Proc. ACM SIGCOMM Asia Workshop, 2005.

[5] L. Huang, K. Matsuura, H. Yamane, and K. Sezaki.Enhancing Wireless Location Privacy Using Silent Period. In Proceedings of the IEEE Wireless Communications and Networking Conference(WCNC), 2005.

[6] L. Lazos and R. Poovendran. SeRLoc: Secure Range- Independent Localization for Wireless Sensor Networks. In Proceedings of the ACM Workshop on Wireless Security (WiSe), 2004.

[7] Z. Li, W. Trappe, Y. Zhang, and B. Nath. Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), 2005.

[8] M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. In Proceedings of WMASH, 2003.

[9] Kun Sun, Peng Ning, Cliff Wang, An Liu, and Yuzheng Zhou. Tinysersync: Secure and resilient time synchronization in wireless sensor networks. In Proceedings of the ACM Conference on Computer and Communications Security, 2006.

[10] Kun Sun, Peng Ning, and Cliff Wang;. Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2):395–408, 2006.

[11] M. Cagalj, S. Capkun, RamKumar Rengaswamy,Ilias Tsigkogiannis, M. Srivastava, and Jean-Pierre Hubaux. Integrity (I) codes: message Integrity Protection and Authentication Over Insecure Channels. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, USA, 2006.

[12] S. ?Capkun, L. Butty´an, and J.-P. Hubaux. SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In Proceedings of the ACM workshop on Security of Ad Hoc and Sensor Networks (SASN), Washington, USA, October 2003.

[13] Y.C. Hu and H. J. Wang. Location Privacy in Wireless Networks. In Proceedings of the ACM SIGCOMM Asia Workshop, 2005.

[14] S. ?Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In Proceedings of the IEEE Conference on Computer Communications (InfoCom), 2005.

[15] M. Sichitiu and C. Veerarittiphan. Simple, accurate time synchronization for wireless sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), 2003.

[16] Y. Zhang, Wei Liu, Yuguang Fang, and Dapeng Wu. Secure localization and authentication in ultra-wideband sensor networks. IEEE Journal on Selected Areas in Communications, 24(2), February 2006.

[17] G. Jiang and G. Cybenko, “Temporal and spatial distributed event correlation for network security”, In American Control Conference, 2004.

[18] B. Harris and R. Hunt, “TCP/IP security threats and attack methods”, In Computer Communications, 1999.

[19] T. Dimitriou, G. Karame and I. Christou, “SuperTrust: A Secure and Efficient Framework for Handling Trust in Super Peer Networks”, In Proceedings of ACM PODC, 2007.

[20] G. Karame, I. Christou and T. Dimitriou, “A Secure Hybrid Reputation Management System for Super-Peer Networks”, In Proceedings of IEEE CCNC, 2008.