Security in Communication Challenges Research Paper

Total Length: 2871 words ( 10 double-spaced pages)

Total Sources: 11

Page 1 of 10

Chapter 1: Introduction

Wireless communications are, to any extent, the most rapidly growing section of the communications sector. For this reason, it has seized the consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et al., 2018). In the past decade, cellular communications systems have faced exponential growth and development and there exist billions of users all over the globe. Statistics indicate that by the culmination of 2018, there were approximately 5.1 billion individuals across the globe that subscribed to mobile services, and this signified approximately 67 percent of the world’s populace. Furthermore, the statistics indicate that more than 60 percent of the population in the world has accessibility to internet (GSMA, 2019).

In delineation, wireless communication takes into account the transmission of message signals through minimal energy radio frequency waves by utilizing open air, with the media aspect including both a transmitter and a receiver. The message signal is conveyed to the nearby antenna spot and is transported via optic-fiber cable to a wired telephone or via radio signal to a different wireless phone. Notably, the vulnerable and open nature of wireless communications networks causes wireless transmissions to be substantially more susceptible to different malicious attacks by impostors. This varies from identity theft, eavesdropping to interrupt data, violating the rights for privacy, denial-of-service attacks, to incorporation of viruses, Trojan horse and other mischievous codes to interrupt valid transmissions, and jamming attacks (Ijemaru et al., 2018). What is more, imposters and trespassers have the ability to incapacitate or deactivate firewall protection to attain accessibility to private and sensitive data and information that is conveyed between two wireless communication devices, in the event that this sort of information is not properly safeguarded by strong and comprehensive encryption. As a result, this points out the significant necessity to enhance security in wireless communication, in order to deal with cybercriminal actions, bearing in mind that at the present moment, progressively more individuals are utilizing wireless communication networks in the home and workplace settings (Ijemaru et al., 2018).

Chapter 2: Literature Review

The enormous worldwide infrastructure does not have any fundamental security mechanisms that are embedded to safeguard itself. As a result, it is set for incredible sharing on both levels of insignificance and extreme necessity and therefore the need for security in communication network technologies is paramount to preclude incessant threats (Jain, 2013). Communication network security is a conception to safeguard both network and data transmission over wireless network. Imperatively, data security is the key element of secure transmission of data over communication networks that are undependable (Jain, 2013). In the contemporary, security is a challenging aspect of data communications that encompasses numerous areas comprising of safe and secure communication challenges, strong data encryption techniques, as well as trusted third party to sustain the database. Security has developed into a significant issue in communications. The necessity for communication network security is mounting on a day to day basis. The fundamental reasons for such security include conducting business, proper communication and safety in prospectively unsafe environments and also the development and execution of enterprise-wide communication security policies (Jain, 2013). The purpose of this paper is to comprehensively examine security in communication technologies.

Wireless security encompasses any initiatives taken that preclude unwarranted access or damage to information that is transmitted over wireless networks in addition to making certain that both the privacy and veracity of data are not compromised (Ijemaru et al., 2018). At the present moment, most of the security architecture that are existent have faced a great deal of compromise owing to the actuality that the airwaves are susceptible to prying and meddling from any individual with radio frequency antenna. Consequently, this has made it significantly challenging to attain complete and total security over wireless communication systems (Ijemaru et al., 2018). There are several security susceptibilities and shortcomings linked with wireless communication networks.

Based on research conducted by Laeeq (2011), the survivability of wireless communications is associated to the protection mechanism of wireless communications and toughness or strength against attacks and failure of network components or communication in its own. These issues comprise of the Wireless Sensor Network gateway forming a sole point of interruption for the back-to-back sensor network infrastructure.

Stuck Writing Your "Security in Communication Challenges" Research Paper?

Secondly, subsequent to the deployment of the communication network, the sensor nodes continue to remain unattended to, which is a fundamental cause of security lapses. The prevailing approaches for location tracking have their own limitations in being able to trace wireless imposters. Another issue is that key threats and challenges of wireless communications are still not taken into consideration with respect to revised specification. Finally, there is also the issue that the deployment of Ad-hoc Wireless Sensor Networks for the purposes of monitoring and checking physical environments continue to be positioned in susceptible zones (Laeeq, 2011).

There are five areas of wireless system security that can be taken into consideration. The first security issue in wireless communication is anonymity. This is the state of not being recognizable or distinguishable within a group of principles. The information regarding a certain individual or entity is sensitive and private and is confined solely to the individual who has the rights and authority to gain accessibility to it. Sustaining anonymity is of great worry…

[…… parts of this paper are missing, click here to view the entire document ]

…signal at terminal T3. Imperatively, the degradedness of the signal can be employed at terminal T1 to preclude terminal T3 from gaining a clear comprehension of the content within the media being conveyed. Cryptographic security solutions executed at application layer entirely disregard these effects and function as though the eavesdropper channel is channel that is free of any errors or mistakes. On the other hand, the fundamental conception of physical-layer security is to clearly take into consideration dissimilarities at the PHY layer to in order to better safeguard the messages interchanged over the main channel (Bagheri-Karam, 2010).

Chapter 4: Conclusion

In spite of the major benefits offered by wireless communications networks, for instance, flexibility, greater productivity, portability, cost-effective installation expenses, roaming proficiencies and numerous more, the security aspect of wireless communication networks has continued to be of massive challenge and worry. In the contemporary setting, wireless communication susceptibilities are on the rise as a result of greater demand levels for greater data rates, the necessity for advanced and progressive services and that of roaming, and the massive disposition of services all over the world. As a consequence, this has generated severe challenging issues in the security of communication wireless systems and the applications in wireless communications settings.

Parenthetically, wireless communication networks and handheld devices are subject to the similar level of susceptibilities and risks with that of conventional wired networks. Nevertheless, in this day and age, the risks and threats linked with wireless communication networks have evolved to a new facet, apparently for the reason that the communication medium, the airwave, of wireless networks is wide open to trespassers, who exploit and misuse that to unveil malevolent attacks for instance denial-of-service attacks, identity theft, abuse of privacy rights, inclusion of viruses or mischievous codes to interrupt and mess up the normal tasks, passive eavesdropping for data interference and active jamming attacks to disturb authentic transmissions. Yet again, impostors also circumvent firewall protection to attain accessibility to private and sensitive data that is communicated between two wireless devices.

In regard to methodology purposed to combat this wireless communication security is the physical layer security. Imperatively, security solutions are dealt with in dissimilar layers. For instance, spread-spectrum modulation methods are utilized at the PHY layer to alleviate jamming of any communication channels, authentication instruments are carried out at the link layer to preclude unsanctioned or unwarranted accessibility, and cryptographic message encryption is carried out at the application layer to safeguard any data and information being conveyed against eavesdropping. For that reason, jamming of communication channels and unsanctioned accessibility, which are susceptibilities at the PHY layer and link layer, correspondingly,….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security In Communication Challenges" (2019, October 21) Retrieved May 2, 2024, from
https://www.aceyourpaper.com/essays/security-communication-challenges-2174628

Latest MLA Format (8th edition)

Copy Reference
"Security In Communication Challenges" 21 October 2019. Web.2 May. 2024. <
https://www.aceyourpaper.com/essays/security-communication-challenges-2174628>

Latest Chicago Format (16th edition)

Copy Reference
"Security In Communication Challenges", 21 October 2019, Accessed.2 May. 2024,
https://www.aceyourpaper.com/essays/security-communication-challenges-2174628