A Survey: Enhancing Wireless Security in the Digital Age

Authors

  • Zain Iqbal Department of Information Technology, Lahore Garrison University, Lahore, 54000, Pakistan.
  • Irshad Ahmed Sumra Department of Computer Science, Lahore Garrison University, Lahore, 54000, Pakistan.
  • Hadi Abdullah Department of Computer Science, Lahore Garrison University, Lahore, 54000, Pakistan.
  • Ijaz Khan Department of Avionics Engineering, National University of Sciences and Technology (NUST), Pakistan.

Keywords:

Encryption, Wi-Fi Protected Access 2 (WPA2), Wireless Local Area Network (WLAN), Privacy and Security, Integrity, 802.11i, Firewall

Abstract

In today’s globalized society, protecting wireless networks from unauthorized users is fundamental. Wireless networks and mobile devices are under constant attack, far more than their wired equivalents, which has made achieving complete protection an unfulfilled goal, despite decades of research. This study considers critical matters such as authentication, confidentiality, integrity, and availability, which are important in the security of wireless networks. We study existing protocols and recommend changes to improve their security. An innovation consists of a new strategic approach to security risk management integrating a data authentication and integration model with machine learning methods. This also provides an examination of the current responses to wireless network security problems, highlighting their advantages and drawbacks in light of constant changes to cyber threats, especially phishing attacks. The objective is to accentuate the need to strengthen wireless networks security to safeguard confidential information from unauthorized access. Additionally, the article provides an in-depth review of methods to address security vulnerabilities associated with wireless networks.

Downloads

Published

2025-03-01

How to Cite

Zain Iqbal, Irshad Ahmed Sumra, Hadi Abdullah, & Ijaz Khan. (2025). A Survey: Enhancing Wireless Security in the Digital Age. Journal of Computing & Biomedical Informatics, 8(02). Retrieved from https://www.jcbi.org/index.php/Main/article/view/860