Strategies For Improved Transaction Security Culture Facing Wireless The Society

Posted by syalala on 9:08 PM in
(Download Journal here)
Discussion of Results Review

        Transactions utilising wireless technologies have been used and culturally accepted, but the awareness of security threats within those transactions seems to be inadequate. This paper specifically focuses on security strategies that should be used for increasing the security of tr ansactions using wireless technologies. To achieve this objective, there needs to be a thorough analysis of security requirements and handlings. Due to some limitations existing in wireless networks, this paper presents how some security weaknesses can be resolved and improved on the application level. In order to present a satisfactory understanding overview of the implications of the security model, a serverless application (serverless network storage) is analysed. It is proposed that an innovative model for security support for wireless networks, through which appropriate and sophisticated handlings can be achieved.

Despite having the same goal, researchers in the field of security has pendapatpendapat which vary in terms of implementation and application. Some researchers believe that each wireless device can handle security (King, 2002). Therefore, the application of wireless devices typically use the Internet (TCP / IP), then the dependence of the quality of the Internet network security is still very high (King, 2002, Wierzbicki et al., 2002). Furthermore, to a certain extent is still expected that the newer wireless technology can still interact with the old wireless technology. As a consequence, new wireless technologies still have to continue to use the mechanism and long security infrastructure (Kim et al., 2002, Wierzbicki et al., 2002). Before getting into the handling of security, the following will be discussed first wireless network.

1.       Wireless Network Layer

Wireless layer providing services (services) common to applications which are in layers / levels of it. This layer generally consists of modules -modul the following: (1) cluster and identity management; (2) discovery; (3) communications; (4) security management; and (5) routing.
2.       Cluster and Identity Management.
Devices that collaborate to form a wireless network is set into clustercluster small size. Criteria and algorithms used for the formation and regulation explained by Senaratna and Khan (Senaratna & Khan, 2002). These modules perform functions related with: the formation of clusters, cluster leadership election, functions to lead the cluster, and data storage cluster members.
3.       Discovery
Mostly distributed wireless architecture and do not have a device pengelo la the
centralized. Therefore, attempts to find cutting-joining devices on the network
is a very important thing. Naturally viewed from the side dynamics, devices
join the wireless network or leave the network will continue to occur constantly.
4.       Communication
The module is set up interaction with other devices. This module also provides some
Data transport mechanism in accordance with the type of interaction. Mo dul is the whole set of communication for the wireless layer. Furthermore, this commmunication module provides one interface for each existing applications on top of this layer. Therefore, although not absolute -Application earlier applicationcan use this interface for communication purposes. The communication module also provides a safe way for data transmission via the merger with the security module management.
5.       Security Management
This module is available an appropriate infrastructure Security settings with a layer of a wireless network. The main functions of these modules can be categorized as follows: (1) key management; (2) encryption/decryption; (3) trust management; dan (4) integrity checker.
6.       Key Management
The basic function of key management is to set the device password-key key pair
which will be used on the module identity management and other security functions. Functions
Other management including the expiry date of a passkey, Kunc i generate a new password,
the circulation of the passkey.
7.       Encryption/Decryption
The module provides the functions necessary encryption and decryption to secure
communications. These functions are collaborating with the communication module. The passkey is accessible on the key repository. All information must be encrypted during transmission using the facilities in this module. By because the wireless layer can support different applications, this module provides some encryption and decryption scheme includes key handling system password.
8.       Trust Management
There are several levels in the trust (Ye et al., 2001). When the module discover new devices
join, the module will look for information about this new device from the device that has cutting-
previously believed. At first, a new device joins y ang will be given the level of trust
most low, but slowly -land value can increase ride. This reflects propagation trust. This mechanism still has weaknesses, but the experience of hundreds of years man stated that the process of building trust in the community groups to work the acceptable level.
9.       Integrity Checker
Integrity checker can be used for management application integrity. a mechanism
such as MD5 checksum can be used for this purpose. This feature can be used for applications that can maintain the integrity of the data in a file that is stored in a distributed disk.
10.   Routing Module
Routing modules contribute to the treatment and dissemination of information through the network routing wireless uses multiple routing mechanisms. Data obtained using ad-hoc network (Royer & Toh, 1999) as well as dynamic routing algorithms are still being investigated for determine compliance with the routing mechanisms in wireless inter-cluster communication.
11.   Security for Wireless Networks
Many researchers have investigated the problem of security on wireless networks (King,
2002, Wierzbicki et al., 2002, Scott & Sharp, 2002, Yeager & Williams, 2002, Kim et al., 2002). Though wireless network layer discussed above already provide some services unt uk security,
The fundamental concern is that it is still very difficult to maintain security in a dynamic environment and are not guaranteed as on most wireless networks.

Copyright © 2009 @helmifauzii's share All rights reserved. Theme by Laptop Geek . | Bloggerized by FalconHive .