Skip to main content
Log in

Survey on Wireless Network Security

  • Review article
  • Published:
Archives of Computational Methods in Engineering Aims and scope Submit manuscript

Abstract

A wireless network is used to connect various wired organizational structures and provide connectivity within the organization for employees to move freely by avoiding the hurdle of a physical network. Maintenance of WLAN security is crucial to an organization because WLANs are directly linked to the core organization’s network. In this paper, we reviewed the architectures and protocols of wireless communication, security issues, and type of threats used to launch an attack as well as their solutions. Finally, we discuss open research for future development to make a secure wireless network and safe for data transfer.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Bay M (2019) Hot potatoes and postmen: how packet switching became ARPANET’s greatest legacy. Internet Hist 3(1):15–30

    Article  Google Scholar 

  2. Cerf VG, Abbas AE (2019) Internet, technology, and the future: an interview with vint cerf. Next-generation ethics: engineering a better society. Cambridge University Press, Cambridge, p 54

    Google Scholar 

  3. Yalda E, Obraczka K, Amiri B (2018) A machine learning approach for dynamic control of RTS/CTS in WLANs. In proceedings of the 15th EAI international conference on mobile and ubiquitous systems: computing, networking and services, pp 432–442

  4. Al-Mejibli IS, Alharbe NR (2020) Analyzing and evaluating the security standards in wireless network: a review study. Iraqi J Comput Inform 46(1):32–39

    Article  Google Scholar 

  5. Low KS, Win WNN, Er MJ (2005) Wireless sensor networks for industrial environments. In international conference on computational intelligence for modelling, control and automation and international conference on intelligent agents, web technologies and internet commerce (CIMCA-IAWTIC'06), vol 2. IEEE, pp 271–276

  6. Allen-Ware MS, Bloom J, Chou JHH, Cochran M, Hughes KA, Iannicelli AT, Pearce JG, Ross A (2019) Preparing computer nodes to boot in a multidimensional torus fabric network. U.S. Patent 10,169,048, issued January 1, 2019

  7. Poonam KK, Laghari A, Laghari R (2019) A Step towards the Efficiency of Collisions in the Wireless Sensor Networks. EAI Endorsed Transactions on Scalable Information Systems, 6, no. 23

  8. Wang Z, Ruan Q (2020) Research on network security subsystem based on digital signal. J Intell Fuzzy Syst 38(1):97–103

    Article  Google Scholar 

  9. Nguyen G, Nguyen BM, Tran D, Hluchy L (2018) A heuristics approach to mine behavioural data logs in mobile malware detection system. Data Knowl Eng 115:129–151

    Article  Google Scholar 

  10. Catania V, Mineo A, Monteleone S, Palesi M, Patti D (2017) Improving energy efficiency in wireless network-on-chip architectures. ACM J Emerg Technol Comput Syst (JETC) 14(1):1–24

    Google Scholar 

  11. Liu Y, Chen H-H, Wang L (2016) Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun Surv Tutor 19(1):347–376

    Article  Google Scholar 

  12. Karp B, Kung HT (2000) GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, pp 243–254

  13. Pärlin K, Riihonen T, Wichman R, Korpi D (2018) Transferring the full-duplex radio technology from wireless networking to defense and security. In 2018 52nd Asilomar Conference on Signals, Systems, and Computers. IEEE, pp 2196–2201

  14. Aneja N, Gambhir S (2018) Profile-based ad hoc social networking using Wi-Fi direct on the top of android. Mob Inf Syst 2018:1–7

    Google Scholar 

  15. https://www.louiewong.com/archives/407. Accessed 18 July 2020

  16. Nalajala P, Godavarth B, Raviteja ML, Simhadri D (2016) Morse code generator using microcontroller with alphanumeric keypad. In 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). IEEE, pp 762–766

  17. Howitt I, Gutierrez JA (2003) IEEE 802.15. 4 low rate-wireless personal area network coexistence issues. In 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003, vol 3. IEEE, pp 1481–1486

  18. Deng D-J, Lien S-Y, Lee J, Chen K-C (2016) On quality-of-service provisioning in IEEE 802.11 ax WLANs. IEEE Access 4:6086–6104

    Article  Google Scholar 

  19. Panda PK, Chattopadhyay S (2019) A modified PKM environment for the security enhancement of IEEE 802.16 e. Comput Stand Interfaces 61(2019):107–120

    Article  Google Scholar 

  20. Sowlati T, Rozenblit D, Pullela R, Damgaard M, McCarthy E, Koh D, Ripley D, Balteanu F, Gheorghe I (2004) Quad-band GSM/GPRS/EDGE polar loop transmitter. IEEE J Solid-State Circuits 39(12):2179–2189

    Article  Google Scholar 

  21. Kim H (2020) Design and optimization for 5g wireless communications. John Wiley & Sons, Hoboken

    Book  Google Scholar 

  22. O’Regan G (2018) Wi-Fi technology. The innovation in computing companion. Springer, Cham, pp 261–263

    Chapter  Google Scholar 

  23. Chang BJ, Chou CM (2006) Adaptive polling algorithm for reducing polling delay and increasing utilization for high density subscribers in WiMAX wireless networks. In 2006 10th IEEE Singapore international conference on communication systems. IEEE, pp 1–5

  24. Naqvi SA (2017) Miniaturized triple-band and ultra-wideband (UWB) fractal antennas for UWB applications. Microw Opt Technol Lett 59(7):1542–1546

    Article  Google Scholar 

  25. de Carvalho JARP, Veiga H, Pacheco CFR, Reis AD (2017) Performance evaluation of IEEE 802.11 a 54 Mbps open laboratory links. In Proceedings of the world congress on engineering, vol 1

  26. Hisham M, Elmogy A, Sarhan A, Sallam A (2020) Energy efficient scheduling in local area networks. Wireless Netw 26(1):685–698

    Article  Google Scholar 

  27. Kumar P, Govindaraj E (2019) Quality enhancement with fault tolerant embedding in video transmission over WMSNs in 802.11 e WLAN. Ad Hoc Netw 88(2019):18–31

    Google Scholar 

  28. Park S, Kim J, Kyuntae JO, HanGyu CHO (2020) Method for transmitting and receiving signal in a wireless local area network and device for same. U.S. Patent Application 16/876,309, filed September 3, 2020

  29. Dhawankar P, Le-Minh H, Aslam N (2018) Throughput and range performance investigation for IEEE 802.11 a, 802.11 n and 802.11 ac technologies in an on-campus heterogeneous network environment. In 2018 11th international symposium on communication systems, networks & digital signal processing (CSNDSP). IEEE, pp 1–6

  30. Cheruvu S, Kumar A, Smith N, Wheeler DM (2020) Connectivity technologies for IoT. Demystifying internet of things security. Apress, Berkeley, CA, pp 347–411

    Chapter  Google Scholar 

  31. Karmakar R, Chattopadhyay S, Chakraborty S (2020) An online learning approach for auto link-Configuration in IEEE 802.11 ac wireless networks. Computer Networks 181(2020):107426

    Article  Google Scholar 

  32. Rajan MNU, Babu AV (2017) Theoretical maximum throughput of IEEE 802.11 ad millimeter wave wireless LAN in the contention based access period: with two level aggregation. In 2017 international conference on wireless communications, signal processing and networking (WiSPNET). IEEE, pp 2531–2536

  33. Khorov E, Krotov A, Lyakhov A, Yusupov R, Condoluci M, Dohler M, Akyildiz I (2019) Enabling the internet of things with Wi-Fi halow—Performance evaluation of the restricted access window. IEEE Access 7:127402–127415

    Article  Google Scholar 

  34. Moura H, Alves AR, Borges JRA, Macedo DF, Vieira MAM (2020) Ethanol: a software-defined wireless networking architecture for IEEE 802.11 networks. Comput Commun 149(2020):176–188

    Article  Google Scholar 

  35. Marques N, Zúquete A, Barraca JP (2020) EAP-SH: an EAP authentication protocol to integrate captive portals in the 802.1 X security architecture. Wireless Personal Commun 2020:1–25

    Google Scholar 

  36. Kettani H, Wainwright P (2019) On the top threats to cyber systems. In 2019 IEEE 2nd international conference on information and computer technologies (ICICT). IEEE, pp 175–179

  37. Drogkaris P Network and Information Security (ENISA) and his interests focus on privacy enhancing technologies, personal data protection and trust. Previously he was involved in several EU-funded research projects and held teaching assistant positions in higher education institutions in Greece. Surveillance, Privacy and Security

  38. Vozikis D, Darra E, Kuusk T, Kavallieros D, Reintam A, Bellekens X (2020) On the importance of cyber-security training for multi-vector energy distribution system operators. In proceedings of the 15th international conference on availability, reliability and security, pp 1–6

  39. Muddu S, Tryfonas C (2020) Interface providing an interactive trendline for a detected threat to facilitate evaluation for false positives. U.S. Patent 10,666,668, issued May 26, 2020

  40. Kettani H, Cannistra RM (2018) On cyber threats to smart digital environments. In proceedings of the 2nd international conference on smart digital environment, pp 183–188

  41. Abdurachman E, Gaol FL, Soewito B (2019) Survey on threats and risks in the cloud computing environment. Procedia Comput Sci 161(2019):1325–1332

    Google Scholar 

  42. Akinrolabu O, Nurse JRC, Martin A (2019) New S (2019) “Cyber risk assessment in cloud provider environments: current models and future needs.” Comput Secur 87:101600

    Article  Google Scholar 

  43. Alhenaki L, Alwatban A, Alamri B, Alarifi N (2019) A survey on the security of cloud computing. In 2019 2nd international conference on computer applications & information security (ICCAIS), pp. 1–7. IEEE.

  44. Shukla AK (2020) An efficient hybrid evolutionary approach for identification of zero-day attacks on wired/wireless network system. Wireless Personal Commun 2020:1–29

    Google Scholar 

  45. Laghari AA, He H, Khan A, Kumar N, Kharel R (2018) Quality of experience framework for cloud computing (QoC). IEEE Access 6(2018):64876–64890

    Article  Google Scholar 

  46. Kekki S, Featherstone W, Fang Y, Kuure P, Li A, Ranjan A, Purkayastha D et al (2018) MEC in 5G networks. ETSI White Paper 28(2018):1–28

    Google Scholar 

  47. Pramanik S (2013) Threat motivation. In 2013 10th international conference and expo on emerging technologies for a smarter world (CEWIT). IEEE, pp 1–5

  48. Kitchin R, Dodge M (2019) The (in) security of smart cities: vulnerabilities, risks, mitigation, and prevention. J Urban Technol 26(2):47–65

    Article  Google Scholar 

  49. Airehrour D, Nair NV (2018) Madanian S (2018) “Social engineering attacks and countermeasures in the new zealand banking system: advancing a user-reflective mitigation model.” Information 9(5):110

    Article  Google Scholar 

  50. Mozumder DP, Mahi JN, Whaiduzzaman MD, Mahi MDJN (2017) Cloud computing security breaches and threats analysis. Int J Sci Eng Res 8(1):1287–1297

    Google Scholar 

  51. Laghari AA, He H, Halepoto IA, Memon MS, Parveen S (2017) Analysis of quality of experience frameworks for cloud computing. IJCSNS 17(12):228

    Google Scholar 

  52. Nazir R, Ahmed Z, Ahmad Z, Shaikh NN, Laghari AA, Kumar K (2020) Cloud computing applications: a review. EAI Endorsed Trans Cloud Syst 6(17):e5

    Google Scholar 

  53. Jouini M, Rabai LBA (2019) A security framework for secure cloud computing environments. Cloud security: concepts, methodologies, tools, and applications. IGI Global, Pennsylvania, pp 249–263

    Google Scholar 

  54. Ferrari P, Flammini A, Rinaldi S, Sisinni E, Maffei D, Malara M (2018) Impact of quality of service on cloud based industrial IoT applications with OPC UA. Electronics 7(7):109

    Article  Google Scholar 

  55. Nagpure S, Kurkure S (2017) Vulnerability assessment and penetration testing of Web application. In 2017 international conference on computing, communication, control and automation (ICCUBEA). IEEE, pp 1–6

  56. Saxena N, Hayes E, Bertino E, Ojo P, Choo KKR, Burnap P (2020) Impact and key challenges of insider threats on organizations and critical businesses. Electronics 9(9):1460

    Article  Google Scholar 

  57. Gwebu KL, Wang J, Wang Li (2018) The role of corporate reputation and crisis response strategies in data breach management. J Manag Inf Syst 35(2):683–714

    Article  Google Scholar 

  58. Palanisamy R, Norman AA, Kiah MLM (2020) Compliance with bring your own device security policies in organizations: a systematic literature review. Comput Secur 2020:101998

    Article  Google Scholar 

  59. Homoliak I, Toffalini F, Guarnizo J, Elovici Y, Ochoa M (2019) Insight into insiders and it: a survey of insider threat taxonomies, analysis, modeling, and countermeasures. ACM Comput Surv (CSUR) 52(2):1–40

    Article  Google Scholar 

  60. Weber K, Schütz AE, Fertig T, Müller NH (2020) Exploiting the human factor: social engineering attacks on cryptocurrency users. In international conference on human-computer interaction. Springer, Cham, pp 650–668

  61. Moncada A (2020) Employee branding: a mixed method study for implementing an employee branding model in practice

  62. Gupta CM, Kumar D (2020) Identity theft: a small step towards big financial crimes. J Financ Crime 27:897–910

    Article  Google Scholar 

  63. Ahmad A, Nasser N, Anan M (2016) An identification and prevention of theft-of-service attack on cloud computing. In 2016 international conference on selected topics in mobile & wireless networking (MoWNeT). IEEE, pp 1–6

  64. Odun-Ayo I, Ajayi O, Okereke C (2017) Virtualization in cloud computing: developments and trends. In 2017 international conference on next generation computing and information systems (ICNGCIS). IEEE, pp 24–28

  65. Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 6(1):19

    Article  Google Scholar 

  66. Nikolai J, Wang Y (2016) A system for detecting malicious insider data theft in IaaS cloud environments. In 2016 IEEE global communications conference (GLOBECOM). IEEE, pp 1–6

  67. Wang K, Miao Du, Maharjan S, Sun Y (2017) Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans Smart Grid 8(5):2474–2482

    Article  Google Scholar 

  68. Singh RS, Prasad A, Moven RM, Sarma HKD (2017) Denial of service attack in wireless data network: a survey. In 2017 Devices for Integrated Circuit (DevIC). IEEE, pp 354–359

  69. Abdelsalam A, Luglio M, Roseti C, Zampognaro F (2017) TCP connection management through combined use of terrestrial and satellite IP-Based links. In 2017 40th international conference on telecommunications and signal processing (TSP). IEEE, pp 37–42

  70. Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6(5):8182–8201

    Article  Google Scholar 

  71. Jameel F, Wyne S, Kaddoum G, Duong TQ (2018) A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun Surv Tutor 21(3):2734–2771

    Article  Google Scholar 

  72. George W, Sliteris R (2019) Apparatus and methods for mitigation of network attacks via dynamic re-routing. U.S. Patent 10,341,379, issued July 2, 2019

  73. Manesh MR, Kaabouch N (2018) Security threats and countermeasures of MAC layer in cognitive radio networks. Ad Hoc Networks 70(2018):85–102

    Article  Google Scholar 

  74. Yusof MAM, Ali FHM, Darus MY (2017) Detection and defense algorithms of different types of ddos attacks. Int J Eng Technol 9(5):410

    Article  Google Scholar 

  75. Yang G, Dai L, Wei Z (2018) Challenges, threats, security issues and new trends of underwater wireless sensor networks. Sensors 18(11):3907

    Article  Google Scholar 

  76. He D, Chan S, Guizani M (2016) Securing software defined wireless networks. IEEE Commun Mag 54(1):20–25

    Article  Google Scholar 

  77. Mohammadnia H, Slimane SB (2020) IoT-NETZ: practical spoofing attack mitigation approach in SDWN network. In 2020 seventh international conference on software defined systems (SDS). IEEE, pp 5–13

  78. Chien W-C, Weng H-Y, Lai C-F, Fan Z, Chao H-C, Ying Hu (2019) A SFC-based access point switching mechanism for software-defined wireless network in IoV. Futur Gener Comput Syst 98:577–585

    Article  Google Scholar 

  79. Ahmed AA, Li CX (2016) Locating and collecting cybercrime evidences on cloud storage. In 2016 international conference on information science and security (ICISS). IEEE, pp 1–5

  80. Pahl C, Jamshidi P, Zimmermann O (2018) Architectural principles for cloud software. ACM Trans Internet Technol (TOIT) 18(2):1–23

    Article  Google Scholar 

  81. Woodward K, Kanjo E, Brown D, McGinnity TM, Inkster B, MacIntyre D, Tsanas T (2020) Beyond mobile apps: a survey of technologies for mental well-being. IEEE Trans Aff Comput. https://doi.org/10.1109/TAFFC.2020.3015018

    Article  Google Scholar 

  82. Laghari AA, He H, Shafiq M, Khan A (2018) Assessment of quality of experience (QoE) of image compression in social cloud computing. Multiagent Grid Syst 14(2):125–143

    Article  Google Scholar 

  83. Laghari AA, He H, Karim S, Shah HA, Karn NK (2017) Quality of experience assessment of video quality in social clouds. Wireless Commun Mob Comput 2017:1–10

    Article  Google Scholar 

  84. Thakral A, Rakesh N, Gupta A (2016) “Space in space”: cyber security capabilities in Indian context. In 2016 online international conference on green engineering and technologies (IC-GET). IEEE, pp 1–6

  85. Qamar A, Karim A, Chang V (2019) Mobile malware attacks: Review, taxonomy & future directions. Futur Gener Comput Syst 97:887–909

    Article  Google Scholar 

  86. Rodríguez GE, Torres JG, Flores P, Benavides DE (2020) Cross-site scripting (XSS) attacks and mitigation: a survey. Comput Netw 166:106960

    Article  Google Scholar 

  87. Abudu AO (2019) Tackling online social network threats: proposed security measures. Abacus (Mathematics Science Series) 44(1)

  88. Jouini M, Rabai LBA, Aissa AB (2014) Classification of security threats in information systems. Procedia Comput Sci 32(2014):489–496

    Article  Google Scholar 

  89. Heartfield R, Loukas G (2016) Evaluating the reliability of users as human sensors of social media security threats. In 2016 international conference on cyber situational awareness, data analytics and assessment (CyberSA). IEEE, pp 1–7

  90. Medhane DV, Sangaiah AK (2016) Source node position confidentiality aspects in wireless networks: an extended review. Int J High Perform Syst Archit 6(2):61–81

    Article  Google Scholar 

  91. Yildiz HU, Bicakci K, Tavli B, Gultekin H, Incebacak D (2016) Maximizing wireless sensor network lifetime by communication/computation energy optimization of non-repudiation security service: node level versus network level strategies. Ad Hoc Netw 37(2016):301–323

    Article  Google Scholar 

  92. Shahzad F, Pasha M, Ahmad A (2017) A survey of active attacks on wireless sensor networks and their countermeasures. arXiv preprint arXiv: 1702.07136

  93. Manulis M, Bridges CP, Harrison R, Sekar V, Davis A (2020) Cyber security in new space: analysis of threats, key enabling technologies and challenges. Int J Inf Secur 2020:1–25

    Google Scholar 

  94. Datsika E, Antonopoulos A, Zorba N, Verikoukis C (2017) Cross-network performance analysis of network coding aided cooperative outband D2D communications. IEEE Trans Wireless Commun 16(5):3176–3188

    Article  Google Scholar 

  95. Cesana M, Redondi AEC (2017) Iot communication technologies for smart cities. Designing, developing, and facilitating smart cities. Springer, Cham, pp 139–162

    Chapter  Google Scholar 

  96. Chaudhari A, Gandikota J, Sen A, Narayan S (2020) A realistic approach to enhance the battery performance of device-to-device (D2D) Relay UEs. In 2020 IEEE 17th annual consumer communications & networking conference (CCNC). IEEE, pp 1–2

  97. Lee E-K, Gerla M, Oh SY (2012) Physical layer security in wireless smart grid. IEEE Commun Mag 50(8):46–52

    Article  Google Scholar 

  98. Jadhav R, Vatsala V (2017) Security issues and solutions in wireless sensor networks. Int J Comput Appl 162(2):14–19

    Google Scholar 

  99. Bouabdellah M, Kaabouch N, Bouanani FE, Ben-Azza H (2018) Network layer attacks and countermeasures in cognitive radio networks: A survey. J Inf Secur Appl 38(2018):40–49

    Google Scholar 

  100. Ee SJ, Ming JWT, Yap JS, Lee SCY (2020) Active and Passive Security Attacks in Wireless Networks and Prevention Techniques

  101. Liagkou V, Kavvadas V, Chronopoulos SK, Tafiadis D, Christofilakis V, Peppas KP (2019) Attack detection for healthcare monitoring systems using mechanical learning in virtual private networks over optical transport layer architecture. Computation 7(2):24

    Article  Google Scholar 

  102. Manickam P, Shankar K, Perumal E, Ilayaraja M, Kumar KS (2019) Secure data transmission through reliable vehicles in VANET using optimal lightweight cryptography. Cybersecurity and secure information systems. Springer, Cham, pp 193–204

    Chapter  Google Scholar 

  103. Demoulin HM, Pedisich I, Phan LTX, Loo BT (2018) Automated detection and mitigation of application-level asymmetric DoS attacks. In proceedings of the afternoon workshop on self-driving networks, pp 36–42

  104. Gu Z, Hardjawana W, Vucetic B, Ho LS (2018) Multi-tenant spectrum and SSIDs controller for WiFi networks. In IEEE INFOCOM 2018-IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 318–323

  105. Ghaleb FA, Zainal A, Rassam MA, Mohammed F (2017) An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications. In 2017 IEEE conference on application, information and network security (AINS). IEEE, pp 13–18

  106. Ozera K, Inaba T, Bylykbashi K, Sakamoto S, Ikeda M, Barolli L (2019) A WLAN triage testbed based on fuzzy logic and its performance evaluation for different number of clients and throughput parameter. Int J Grid Util Comput 10(2):168–178

    Article  Google Scholar 

  107. Cerina L, Santambrogio MD, Franco G, Gallicchio C, Micheli A (2020) EchoBay: design and optimization of echo state networks under memory and time constraints. ACM Trans Archit Code Optim (TACO) 17(3):1–24

    Article  Google Scholar 

  108. Zhang X, Fu X, Hong L, Liu Y, Wang L (2020) Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network. Int J Distrib Sens Netw 16(6):1550147720928733

    Article  Google Scholar 

  109. Ghugar U, Pradhan J (2020) Survey of wormhole attack in wireless sensor networks. Comput Sci Inf Technol 2(1):33–42

    Article  Google Scholar 

  110. Olaniyan OM, Omodunbi BA, Adebimpe E, Bolanle WW, Oyedepo OM, Adanigbo OO (2020) Power aware and secured routing protocol in mobile ad-hoc network: a survey. Technology 11(7):706–717

    Google Scholar 

  111. Dong S, Zhang X-G, Zhou W-G (2020) A security localization algorithm based on DV-hop against sybil attack in wireless sensor networks. J Elect Eng Technol 15(2):919–926

    Article  Google Scholar 

  112. Salau AO, Marriwala N, Athaee M (2021) Data security in wireless sensor networks: attacks and countermeasures. Mobile radio communications and 5G networks. Springer, Singapore, pp 173–186

    Chapter  Google Scholar 

  113. Ahmad Z, Khan AS, Shiang CW, Abdullah J, Ahmad F (2020) Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans Emerg Telecommun Technol 2020:e4150

    Google Scholar 

  114. Chakravorty R, Prakash J (2020) A review on prevention and detection schemes for black hole attacks in MANET. In 2020 8th international conference on reliability, infocom technologies and optimization (Trends and Future Directions)(ICRITO). IEEE, pp 801–806

  115. Khalil M, Azer MA (2020) Crypto-SAP protocol for sybil attack prevention in VANETs. Advances in computer, communication and computational sciences. Springer, Singapore, pp 143–152

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Asif Ali laghari.

Ethics declarations

Conflict of interest

Authors did not have any conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nazir, R., laghari, A.A., Kumar, K. et al. Survey on Wireless Network Security. Arch Computat Methods Eng 29, 1591–1610 (2022). https://doi.org/10.1007/s11831-021-09631-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11831-021-09631-5

Navigation