Infiltrations into Wireless Networks by Attackers

dc.contributor.authorHaroon Rashid Hammood Al Dallal
dc.contributor.authorYasir Adil Mukhlif
dc.date.accessioned2026-01-01T22:28:18Z
dc.date.issued2022-09-20
dc.description.abstractDue to the insecurity of wireless channels, communications are open to a wide variety of different sorts of assaults. It is still difficult and important to solve the problem of communications in wireless networks. In this study, current developments It presents the requirements and capabilities necessary for encrypting data carried out via "wireless networks". "Wireless networks" are now being utilized in a broad variety of commercial and military applications to collect data in real-time and dependent on occurrences. The nature of network deployment renders them susceptible to a variety of security risks. Traditional security techniques are insufficient to ensure the safety of the nodes because of the constraints placed on available resources. The study of many aspects of network security has led to the development of several preventative measures. Throughout this article, we have looked at several security techniques. We created and analyzed strong model for the integration of heterogeneous wireless networks by using different security techniques in terms of the overheads associated with the packets and compared the amount of time it took to send the packets, the average amount of delay, and the amount of energy used. That result shows that the transmission outgoings were reduced as compared to other techniques, and this is demonstrated by the reduced costs.
dc.formatapplication/pdf
dc.identifier.urihttps://geniusjournals.org/index.php/ejmc/article/view/2189
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/68431
dc.language.isoeng
dc.publisherGenius Journals
dc.relationhttps://geniusjournals.org/index.php/ejmc/article/view/2189/1902
dc.sourceEurasian Journal of Media and Communications; Vol. 9 (2022): EJMC; 10-16
dc.source2795-7632
dc.subjectdemonstrated
dc.subjecttechniques
dc.subjectpreventative
dc.subjectsafety
dc.titleInfiltrations into Wireless Networks by Attackers
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
dallal_2022_infiltrations_into_wireless_networks_by.pdf
item.page.filesection.size
371.8 KB
item.page.filesection.format
Adobe Portable Document Format

item.page.collections