Open Access Open Access  Restricted Access Subscription Access

Modern Version of Network Security, their Issues and Challenges

S. Priyadharsini, K. Thamizhmaran

Abstract


Nowadays, a secure network is a must for any kind of enterprise. High-speed wired and wireless networks, as well as internet services, are becoming less dependable and more unsafe due to growing security risks. Modern security measures are more crucial in meeting the state-of-the-art requirements of the rapidly expanding businesses of today. The requirement is also felt in fields such as defense, where the main concerns with information security are secure and verified resource access. The author of this paper has outlined the key criteria and measurements pertaining to significant industry/organizational needs for setting up a secure network. Wi-Fi networks are widely used to connect different devices wirelessly and offer wireless network access to a variety of resources. To counteract network hacking attempts and Wi-Fi risks, many conditions are needed.  This study examines crucial security precautions associated with various network scenarios in order to provide a completely safe network environment within an enterprise. Additionally, the author included a case study to show the bare minimum of precautions needed to set up network security in any kind of business.


Full Text:

PDF

References


Anand Patwardhan and Iorga, Secure routing and Intrusion Detection in Ad-hoc networks, in Proc. 3rd Int. Conf. Pervasive Computer Communication, pp.191–199, 2005.

T. Reddy, et al. “Quality of Service Provisioning in Ad Hoc Wireless Networks: A Survey of Issues and Solutions”, Ad Hoc Networks, Vol. 4, No. 1, pp. 83-124, 2006.

K. Liu, et al. “An acknowledgment-based approach for the detection of routing misbehaviour in MANETs”, IEEE Trans., Vol. 6, No. 5, pp.536–550, 2007.

Z. Shen, et al. “Security and QoS Self-Optimization in Mobile Ad Hoc Networks”, IEEE Trans. Mobile Computing, Vol. 7, pp. 1138-1151, 2008.

H. Wu, et al. “QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad Hoc Networks”, Ad Hoc Networks, 2009, Vol. 5, No. 2, pp.600-612.

K.Thamizhmaran, et al. “Authentication and Intrusion Detection in MANET”, International Journal of Advance Research in Technology, Vol. 3, No. 3, pp.15-21, 2012.

Shakshuki, et al, EAACK — A Secure Intrusion: Detection System for MANETs, IEEE Trans on industrial electronics, Vol. 60, No. 3, pp. 1089-1098, 2013.

Prabu, K. and Subramani, A. Energy efficient routing in MANET through edge node selection using ESPR algorithm, Int. J. Mobile Network Design and Innovation, Vol. 5, No. 3, pp.166–175, (2014).

J. P. Hespanha, P. Naghshtabrizi and Y. Xu (2007) “A survey of recent results in networked control systems,” Proceedings of the IEEE, Vol. 95, No. 1, pp. 138–162.

E. Natsheh, S. Khatun, A. B. Jantan and S. Subramaniam (2008) “Fuzzy Metric Approach For Route Lifetime Determination In Wireless Ad Hoc Networks”, International journal of Ad Hoc and Ubiquitous Computing, Vol. 3, No. 1, pp. 1-9.


Refbacks

  • There are currently no refbacks.