Open Access Open Access  Restricted Access Subscription or Fee Access

Security and Privacy in Wired and Wireless Networks, Hybrid, Sensor and Adhoc Networks

M. Bala humsika, M. Deepthi

Abstract


In this paper I analyze the role of the security and privacy in different networks. Networks may be of two ways, (i.e.) wired and Wireless networks. We will also discuss about the hybrid, sensor and ADHOC networks in the role of wired and wireless networks. b4� ev C�+9

A Cloud Computing is the recent trend in IT, where computing and data storage is done in data centers rather than portable Personal Computers. Cloud security is the current discussion in the IT world. In cloud the data is transferred among the server and the client. The cloud moves the application software and database to large data centers, where the management of data and services may not be fully trustworthy. This paper contains the secured data storage and retrieval in cloud using a Triple DES algorithm. Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management.

Social Networks on other hand is the important aspect of IT industry. There are many social network sites which allow the users to post comments on other users’ profiles and pages. However, a number of social networking sites allow users to include multimedia content like photo/image, video etc, as part of these comments. The study encloses the attacking vector of two popular social networking Web sites, Flicker and LinkedIn. Specifically, it demonstrates three attacks in social network—the Social-DDoS attack, the Man-in-Middle attack, and Password-Based attack. The research defines the above attacks and accommodates the prevention techniques to mentioned flaws in social network.

The paper ‘Security in Cloud Computing and Social Networks’ explores the problems in cloud computing and attacks in social network with solutions for secured data storage in cloud and attack free networking sites.

eg$�ad C 9specific plans tailored for each domain and exposure area in a holistic manner. Key focus areas should include governance, risk and compliance, users (identity assurance regardless of location or device type), data (sensitive data protection no matter where it resides), applications (application security modernization), infrastructure (securing the “borderless” enterprise including cloud computing) and assets (cyber supply chain). The challenge is far broader than simply addressing one issue such as securing mobile devices or securing cloud computing environments, so by ensuring the Cyber Security strategy addresses all of these inter-related trends, business leaders can be confident of a defense-in-depth approach.

 

For businesses and governments alike, getting the Cyber Security posture right across all its elements will be vital for future growth, innovation and competitive advantage in order to truly exploit the business and economic opportunities provided by technologies such as cloud, mobile and social computing as well as smart computing and IT appliances. A Cyber Security-related mis-step in any of these rapidly emerging areas can lead to lost productivity and potentially serious damage to brand reputation. There is no single answer for success, but by working across public- and private sector partnerships and by advancing security measures particularly with regard to mission-critical systems, processes and applications that are connected into cyberspace, businesses will be able to work towards a future environment that is both open and secure and prosperous.

Keywords


Wired Network, Wireless Network,Hybrid Network, Sensor Network

Full Text:

PDF

References


http://www.blackbox.com/tech_docs/tech_overviews/wiredwireless.html

http://compnetworking.about.com/od/wirelesssecurity/

www.readersdigest.com

X. Su, B.S. Prabhu, and R. Gadh, “RFID based General Wireless Sensor Interface”, Technical Report, UCLA, 2003

Wireless Communications and Networking Conference (WCNC), March 17-21, 2002, Orlando, FL. Djenouri, L. Kheladi, N. Badache. (4th quarter 2005). "A Survey of Security Issues in Mobile Ad hoc and Sensor Networks".IEEE Communications Surveys and Tutorials 7.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.