Analysis of wireless network security in internet of things and its applications

Analysis of wireless network security in internet of things and its applications

27 February 2024 | Anuradha Kanade, Chitra Sabapathy Ranganthan, Jyothi Babu A, Ramachandran G, Ashok Kumar Kusuma, Manav Anand, Lokeswar Reddy DV
The paper "Analysis of Wireless Network Security in Internet of Things and its Applications" by Karade A et al. explores the security challenges and solutions in wireless networks, particularly in the context of the Internet of Things (IoT). The study emphasizes the importance of network security in IoT, highlighting the risks such as user privacy leaks and the need for robust security measures. The authors propose a risk investigation system that leverages big data, cloud computing, and advanced technologies to identify and notify users and relevant departments of potential security issues. The system is designed to be lightweight and continuous, continuously monitoring network threats. The paper also discusses the significance of channel estimation technology in LTE systems, which is crucial for reducing bit error rates and enhancing security. The authors present a two-dimensional Discrete Cosine Transform (DCT) channel estimation method, which is simulated and evaluated for its accuracy and effectiveness in addressing error flat bottom issues in large delay channels. The design and operation of the risk investigation system are detailed, including its architecture, layers, and modules. The system uses Service-Oriented Architecture (SOA) and is built on the Android platform, integrating mobile access technology, wireless connections, databases, and network security. The system's layers include the fundamental layer, data layer, user layer, application layer, and application support layer, each serving specific functions in network security management and user interaction. The paper also examines the impact of new technological trends on network security, such as the integration of Wi-Fi in IoT systems and the rapid proliferation of IoT devices. It highlights the importance of network security in protecting company information and the role of new technologies like 5G, micro and microscopic sensors, and blockchain in enhancing security. Finally, the authors conclude that their proposed methods can improve interpersonal and inter-governmental cooperation, and that network security regulatory offices play a crucial role in preventing computer security events. The study uses simulation-based research to evaluate the effectiveness of security-aware routing methods in ensuring secure wireless communication between users over multiple topology trails.The paper "Analysis of Wireless Network Security in Internet of Things and its Applications" by Karade A et al. explores the security challenges and solutions in wireless networks, particularly in the context of the Internet of Things (IoT). The study emphasizes the importance of network security in IoT, highlighting the risks such as user privacy leaks and the need for robust security measures. The authors propose a risk investigation system that leverages big data, cloud computing, and advanced technologies to identify and notify users and relevant departments of potential security issues. The system is designed to be lightweight and continuous, continuously monitoring network threats. The paper also discusses the significance of channel estimation technology in LTE systems, which is crucial for reducing bit error rates and enhancing security. The authors present a two-dimensional Discrete Cosine Transform (DCT) channel estimation method, which is simulated and evaluated for its accuracy and effectiveness in addressing error flat bottom issues in large delay channels. The design and operation of the risk investigation system are detailed, including its architecture, layers, and modules. The system uses Service-Oriented Architecture (SOA) and is built on the Android platform, integrating mobile access technology, wireless connections, databases, and network security. The system's layers include the fundamental layer, data layer, user layer, application layer, and application support layer, each serving specific functions in network security management and user interaction. The paper also examines the impact of new technological trends on network security, such as the integration of Wi-Fi in IoT systems and the rapid proliferation of IoT devices. It highlights the importance of network security in protecting company information and the role of new technologies like 5G, micro and microscopic sensors, and blockchain in enhancing security. Finally, the authors conclude that their proposed methods can improve interpersonal and inter-governmental cooperation, and that network security regulatory offices play a crucial role in preventing computer security events. The study uses simulation-based research to evaluate the effectiveness of security-aware routing methods in ensuring secure wireless communication between users over multiple topology trails.
Reach us at info@study.space