Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
The most significant technological advancement witnessed in the 20th century was the expansion of World Wide Web in the 1990s. This resulted in the interconnectedness of millions of computers and other pages of information worldwide (Masrek et al. 199). Additionally, it was very cheap to share information across the globe. The introduction of laptops and other portable devices that replaced the desktop computer indicated that there was an influx of mobile wireless connections across the globe (Masrek et al. 199). With time the mobile phones and palmtops were included in the list of easy to move around and accessible networks. The wireless developments in the society have in addition greatly improved from the advent of these technologies.
The 21st century has witnessed a wide range of usage of wireless devices especially due to portability. This is attributed to the fact that the design of wireless devices does not emphasize on heavy computation and overly secure communication but it is often treated as add-ons (Peng & Sushil 45). Additional limitations such as shared medium have attracted a large number of users to wireless networks. Security procedures such as the jamming attack are difficult to detect and yet very easy to initiate (Peng & Sushil 45).
Smith and Caputi (265) note that wireless networks are very cheap and thus are getting used in many modalities currently. Their uses range from the wireless local area networks to mesh and other sensor networks. As such, their range is wide making the provision of security and trustworthiness a critical issue. Generally, wireless networks are open in nature and are constructed on shared mediums, thus the provision of secure networks is very difficult in such instances (Peng & Sushil 45). An outsider can for instance interrupt a communication from taking place. This can be done by sending constant and other bogus messages that are periodically sent for collision purposes in the network. The bogus messages later lead to increased back off at the node level and other multiple transmissions of data. A jammer for instance can be referred to as a wireless device that produces radio interference attacks on a wireless network (Peng & Sushil 48).
The main idea behind a jammer is to block wireless connections and keep the medium solely for itself or deform a valid communication that is going on (Peng & Sushil 48). This goal can be successfully accomplished by warding off the traffic source of information from sending out packet data or by thwarting the reception of legitimate data packages. This process, just like hacking, is meant to retrieve information from an authorized user to unauthorized users. There are many jamming approaches and strategies that can be used by an attacker to disrupt communication. The most common is the time-based strategy, where the jamming signal is active and occurs in specified time (Smith & Caputi 268). Other more advanced schemes in jamming use the knowledge of the physical and layer specifications of the target system. Thus jamming is carried out by eliminating some radio frequency signal in the target system (Smith & Caputi 268). Jamming can however be effectively tackled by the PHY-layer communication techniques; which are based on spreading techniques, for instance the Frequency Hopping Spread Spectrum (FHSS). The installation of such systems ensures that the suppleness of the system is maintained (Smith & Caputi 270).
Advancements in computer science have made it possible for companies such as banks to lose billions through electronic fund transfers, which the culprits use via undetected bank systems. Additionally, through wireless communications, terrorists have been able to carry out their main targets. For instance in the 9/11 attacks, the supposed culprits purchased their air tickets through the undetected online system of the airport. Hacking, the unprofessional act of assessing unauthorized data has been possible through advancements in technology. As such, it has led to many problems for the international community, most notably emanating from the leaked messages from the United States government following their release by Julian Assange. Thus, many computer engineers have proposed the Mobility Oriented Trust system (MOTS) that makes use of the trust table by incorporating a trust node in each cable (Murgolo-Poore et al. 175).
Wireless communications where wireless management systems are installed can greatly improve the effectiveness and ease in the application of multiple procedures in an organization. Murgolo-Poore and colleagues add that the output of the various procedures when in good form increases productivity (179). Many organizations have thus transcribed to the wireless connections and the technology is greatly growing, assisted with the advancements in computer science. The concept of trust is very vital in communication and in the development of net work protocol designers, especially where the main intent is to establish a trust relationship in the participating nodes (Murgolo-Poore et al. 175). The latter allows for collaborative use of the systems metrics. Trust however, as noted, is built if interactions between users have been faithful. In any wireless network, trust is very fundamental and it can be defined as the degree of belief about the behavior of other entities and in most cases it is context based. For instance one can be trusted as an expert in car fixing but not in network installations.
Works Cited
Masrek, Mohamad Noorman, Jamaludin Adnan and Mukhtar Sobariah Awang. Evaluating academic library portal effectiveness. Journal of Library Review, 2010, 59.3, 198-212. Print.
Murgolo-Poore Marie E., Pitt Leyland F., Berthon Pierre R. and Prendegast Gerard. Corporate intelligence dissemination as a consequence of intranet effectiveness: an empirical study. Public Relations Review, 2003, 29.2, 171-84. Print.
Peng Ning and Sushil Jajodia, Intrusion detection techniques. The Internet Encyclopedia. John Wiley & Sons. 2003. Print.
Smith, Brooke and Caputi Peter. Cognitive interference model of computer anxiety: Implications for computer-based assessment. Behavior & Information Technology, 2001, 20.4, 265 273. Print.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.