Assignment 3 – Annotated Bibliography – draft

Completed 1st draft of Assignment 3  – Annotated Bibliography

A – Annotated Bibliography

Lindroos, S., Hakkala, A., & Virtanen, S. (2021, Oct 9). A systematic methodology for continuous WLAN abundance and security. Computer Networks. doi:https://doi.org/10.1016/j.comnet.2021.108359

This article researches the state of WLAN security and associated protocols. It uses a methodology to survey WLAN security called ‘wardriving’ and the principle of passive WLAN scanning. The authors start with a review of WLAN security, the mechanisms introduced over the years, and also current protocols used in WLAN security. The authors also look at the future direction of WLAN security Drawbacks from this article are that its research is concentrated only on Finland and also that ethical concerns have been raised with using wardriving, of which the author seem okay with. I’ve selected this article as it has very good sections focusing on the current landscape and state of WLAN security. It also highlights problems and weaknesses of the current protocols (e.g. xx) used in WLAN security, as well as future security situation, all of which I can use in my final report and apply for my workplace.

Li, Y., Guo, W., Meng, X., & Xia, W. (2020). Charging wirless sensor network security technology based on encryption algorithms and dynamic model. International Journal of Distributed Sensor Networks, 16. doi:DOI: 10.1177/1550147720901999

This article central focus is to propose a method/scheme to solve existing security problems in wireless networking. It analysis the current existing wireless security models, i.e.  (RC4 encryption algorithm and the AES protocol) in detail and proposes an advanced model using “virtual private network encryption network to provide an encryption layer for communication between devices and wireless networks, thus, the data in network transmission can be encrypted and protected” Li  et al., 2020.  The authors use a number of tests to support how their proposed model improves security. Weaknesses are that the authors acknowledge that the scheme does have issues (cost) as well as technical issues, which requires further research is required. The paper is beneficial as it has a review of current wireless networking issues and their disadvantages, which can be used for the 1st part of my paper, and a scheme proposed to solve these issues, which can be used for the 2nd part of the paper, i.e. solutions section

Liu, L., Cao, M., & Sun, Y. (2021, Dec 21). A fusion data security protection scheme forsensitive E-documents in the open network environment. PLOS ONE. doi:https://doi.org/10.1371/journal.pone.0258464

This article looks at the area of electronic documents and data security in an open network environment.  The authors analyse the current security methods used, focusing on data storage and data access security. These methods are based on cryptology and encryption algorithms, using these approaches the authors propose a new scheme called FDSPSFSED or ‘fusion data security protection scheme for sensitive E document’. They list the advantages of this scheme and go into extensive framework and development of their plan.  Drawbacks are there this scheme is in its infancy so untested in a real world environment but their research provides reliable data security. The scheme is not WLAN specific but can apply for any ‘open’ network. So can be applied to WLAN and my workplace once the technology is available.

Yu, Y., Peng, W., & Lu, J. (2021, Dec 21). Wireless network security game based on conditional privacy policy. Computer Communications, 96-106. doi:https://doi.org/10.1016/j.comcom.2021.12.011

This article concentrates on the wireless networking security and communication. The authors begin with several pages on wireless security threats and requirements. The authors then move into their proposed scheme, based on a “certificate based group authentication” scheme and then using an anonymous change protocol. They also focus on the idea of ‘user and network privacy’ in their work. Their results are supported by xxx.   Drawbacks for this paper are that the work is ‘experimental’, and it focuses on wireless body area network (WBAN) which are wireless networks with human sensor nodes and mobile devices. These are not currently utilised in my workplace, which just consists of LAN and WLANS, which is the focus of my report. However, the technology as well as the security policy used is relevant. And any future growth of my WLAN may or can employ this proposed scheme, as sensor WBAN nodes are a growing technology. Also the papers look at the security threats and security requirements provide a very good basis for any WLAN , mine included

Nazir, R., Iaghari, A., Kumar, K., & Ali, M. (2021, Jul 4). Survey on Wireless Network Security. Archives of Computational Methods in Engineering. doi:https://doi.org/10.1007/s11831-021-09631-5

This article is a survey on the current state of WLAN security and wireless security. The authors also look at the wireless architecture and the protocols and standard employed for the technologies used in WLAN networks. The authors categorise and list of security threats by a number of different approaches. They list them by the Types of threats (sources, groups or motivation). The authors look at the ‘Intent’ of the threat, intentional or unintentional. The authors look at the effects and damage these threats can do to the information within the WLANs. Tabl1 in the paper list the threats and good brief explanations of these threats. The authors also have separate sections of the Security Challenges for WLASN and ‘Solutions’ for WLAN. These 2 sections are valuable resources for my report to highlight the existing focus my currents WLANS should be looking at in the overall plan and policy employed, as  well as threats that are just emerging.. Overall this paper provides valuable information and will assist greatly for the 1st section part of my paper and the list of threats my WLAN should be looking art and counteracting.

Tao, H. (2021). The identity authentication of Wi-Fi system based on network security. Annals of Telecommunications (2021) , 313–320. doi:doi.org/10.1007/s12243-020-00793-0

This paper studies Wi-Fi security, the current challenges facing wife and its implementations. The authors then proposes to address these problems by designing 2 network authentication programs.Tao argues that there are hidden dangers in wireless security and these have emerged in recent times, which goes to make security managements of wireless network more complex and thus more equipment is required to combat the threats. 3 issues the author raises in Wi-Fi network security are: websites, AP, and Gateway ports.  The scheme the author proposes uses a third party platform to add users and authentication protocols as a means to solve these security problems. The value of this paper scheme proposed provides good information for my paper and WLAN utilised. Though the scheme is experimental, the author argues it’s a simple design, low cost but high in security so if ever comes commercially available provides a good option.

Lu, Q., Jiang, R., Ouyang, Y., Qu, H., & Zhang, J. (2019, Sep 20). BiRe : A client-side Bi -directional SYN Re flection mechanism against multi-model evil twin attacks. Computers & Security. doi:https://doi.org/10.1016/j.cose.2019.101618

This article focuses on a 1 particular regular and persistent threat for WLANS, that of an evil twin attack (ETA), which is where a rogue access point (RAP) masquerades as a legal point (LAP). This form of an attack can cause leakage private details. The authors contend that ETA security measures deployed at the client side are greater measures than those at the ‘admin’ side but they argue that these current measures are only targeted at individual ETA and not on the ‘parallel model’. The authors then introduce a scheme called to combat against these multi model ETA’s, which they called BiRe, short for Bi-directional TCP SYN Refection. The authors go into detail about this tool, how it overcomes the shortcomings of the current tools and provide extensive testing and results. This papers value is that introduces a potential tool against 1 form of common WLAN security attacks. This tool according to the authors is both ‘practical and cost friendly’ and can be used without any changes to existing firmware. Providing a viable option for myself to add to my paper and put into practical use.

Yang, L., Li, J., Yin, L., Sun, Z., Zhao, Y., & Li, Z. (2020, Sep 25). Real-Time Intrusion Detection in Wireless Network: A Deep Learning-Based Intelligent Mechanism. IEEE Access, 8. doi:DOI 10.1109/ACCESS.2020.3019973

This paper propose a scheme designed to detect cyber attacks inside WLANs much quicker and efficiently. The author began by looking at the challenges facing WLANS and how to develop an effective wireless intrusion mechanism. With this in mind the authors based on ‘Conditional Deep Belief Network (CDBN), which is designed to detect irregularities in a real time.  Drawbacks are that these research and data is very high level detail and is still in developmental stage and the authors plan to extend their work by looking into big data environments. So any practical application for my work WLANS is not feasible, but the concept of real time detection of attacks is valuable and can include in my report as a possible future usage. The results the author produce are promising and achieve better results than other comparative deep learning tools.

Machado de Sousa, E., & Shahzad, A. (2021, Oct 19). Data Loss Prevention from a Malicious Insider. Journal of Computer Information Systems. doi:https://doi.org/10.1080/08874417.2021.1980748

This papers main focus is looking at the data security and the threats from that of a malicious insider. The authors provide a good in depth summary of the behaviours of this threat posed by insiders , as well as their motivation. The value to my report comes in the later section of the article when the authors go into discussion of the general security controls that can be employed to combat these inside threats. Not only where the weaknesses of the security measures but the risk these measures face and what areas management and IT administrators can employ as a form of security or data management. the weakness of this article is that is that it is  not WLAN and is concerned with ‘data loss’ in general. The authors also focus on cloud computing and cloud service providers, which is not part of my report and they also didn’t consider government organisations (which I’m a part of). But the value lies in the authors identification and listing of malicious insiders threats, and measures that can be introduced to combat their threats, which is a practical application in my workplace.

Tao, X., Kong, K., Zhao, F., Cheng, S., & Wan, S. (2020, Nov 10). An efficient method for network security situation assessment. International Journal of Distributed Sensor Networks. doi:DOI: 10.1177/1550147720971517

This paper is focused on the topic of network security assessment and argues the importance and necessity of evaluating the current state of the networks security. the author look into the importance and growth of network security situational awareness (NSSA) in order to understand one owns network, its security and handle threats that emerge. the author then go into great depth and propose a new approach to combat these threats based on ‘stack autoencoding’ (SAE) network’ and combine it with back propagation neural networks’ (BPNN).  the authors go into very high depth level research and experiments. Drawbacks are that the work is still in its infancy and very high level which is not really practical at the movement for work. But it can be added to my paper as a new approach / schemes proposed for network security, especially for assessing current network status, which as a LAN/WLAN administrator is a necessary part of my job.

 

Ding, X., Ding, F., Chen, X., & Wang, X. (2020, Feb 7). Security-reliability tradeoff for multi-terminal multi-mode coexisting systems in the presence of multiple eavesdroppers. IET Communications, 1221-1227. doi:doi: 10.1049/iet-com.2019.0117

This paper looks at the particular threat to wireless networks of eavesdroppers. The authors proceed to set up a wireless network with several smart terminals that rely on multi-mode with an eavesdropper threat who attempts to deliberately tap into the wireless communication.. The authors argue while there has been lots of research in multi terminal wireless networks, there is a lack of research and attention in ‘multimode multi terminal wireless networks’. The authors propose a scheme called transmission mode smart terminal scheduling (TM-STS) I order to enhance the security of the wireless networks and terminals. They then proceed to produce the results of their extensive work and experimentation. Drawbacks are that my networks do not have multi-mode at the moment, but my network technology and set yup are growing so there is the distinct possibility this could be employed in my workplace in the future. So I can add to my report as future wireless technology measures, as well as be on top of the threats and technology as my own network expand.

Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R., & Bellekens, X. (2020, June 16). A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems. IEEE Access. doi:10.1109/ACCESS.2020.3000179

This paper delves into the topic of ‘anomaly detection’ within modern networks and argue that current tools used for this are failing to adapt to changing network architecture and the related threats. The authors focus on the gaps and shortcomings of the data sets used and the impact of using Network Intrusion Detection Systems  called NIDS. Where this paper is very useful for my report is a detailed section on the threat taxonomy for wireless networks. The authors go through various classification methods and approaches. Whether by the attack techniques, threat sources or by the layers of the Open systems Interconnection (OSI) – Application, Presentation, Session, Transport, network, data link and physical. The authors look at the threats posed to each OSI layer. This information and related diagrams provide a very good listing of the threats to WLANS and can provide the basis of the 1st part of my final report. Figure 4 –Taxonomy of Threats, provides an exceptional summary of the network threats using the criteria of 1) Source, then 2) Affected OSI layer, followed by 3) Active or Passive threat which is likely to be included in final report as well as useful in exiting networking situation.

 

Leave a Reply

Your email address will not be published. Required fields are marked *