Reference Hub2
Manifold Surveillance Issues in Wireless Network and the Secured Protocol

Manifold Surveillance Issues in Wireless Network and the Secured Protocol

Mamata Rath, Bibudhendu Pati, Binod Kumar Pattanayak
Copyright: © 2020 |Volume: 14 |Issue: 1 |Pages: 11
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781799805359|DOI: 10.4018/IJISP.2020010102
Cite Article Cite Article

MLA

Rath, Mamata, et al. "Manifold Surveillance Issues in Wireless Network and the Secured Protocol." IJISP vol.14, no.1 2020: pp.16-26. http://doi.org/10.4018/IJISP.2020010102

APA

Rath, M., Pati, B., & Pattanayak, B. K. (2020). Manifold Surveillance Issues in Wireless Network and the Secured Protocol. International Journal of Information Security and Privacy (IJISP), 14(1), 16-26. http://doi.org/10.4018/IJISP.2020010102

Chicago

Rath, Mamata, Bibudhendu Pati, and Binod Kumar Pattanayak. "Manifold Surveillance Issues in Wireless Network and the Secured Protocol," International Journal of Information Security and Privacy (IJISP) 14, no.1: 16-26. http://doi.org/10.4018/IJISP.2020010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With rapid growth of internet users and frequently emerging communication technology, the issues of using web as a worldwide platform and the requirement to design the smart applications to coordinate, discuss, register, and outline gradually emerges. Information transmission through a wireless network involves the radio signals, the arrangement of information packets, and the network topology. As each segment is correlated to each other, it is very essential to employ security mechanism in these components and real security control must be connected on them. Thus, security plays a critical factor in wireless network. This article highlights security issues in current wireless networks such as mobile ad-hoc network and IoT-supported networks and it also proposes a security-based S-RAID protocol design for security control in cluster based wireless networks. Simulation results show proficiency and better transmission rate of the proposal when it was compared with other similar approaches.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.