Sunday, September 22, 2019

4G Security or Application Security on the Web Research Proposal

4G Security or Application Security on the Web - Research Proposal Example 4G technology is aimed in order to simplify wireless abilities, network speeds, and enhanced pictorial expertise. The characteristics of these telecommunication technologies have increased the concern about network security. As wireless system has diverse copyrighted technologies and security etiquettes, it is hard to make a universal security plan for the devices which apply multiple etiquettes such as 4G system (Akyildiz, Gutierrez-Estevez, & Reyes, 2010). Background of Study 4G requires an exclusive approach in telecommunication technology for developing operative models to accomplish its strategic objectives. The requirement of 4G networks is associated with the increased utilization of websites (such as Facebook) and improvement in download speed from internet portals which entail remarkable bandwidth (such as YouTube videos). As these websites are gaining much admiration within people nowadays, therefore it is a great prospect for telecommunication service providers to accommod ate the desires of people. However, there are a few security concerns that telecommunication provides need to address and resolve for better service (Ahmed, Garrison, Gruen, Kelly, & Pankey, 2003). Literature Review The first 4G network was developed in the year 2009 through joint venture between two organizations, Intel and Clearwire. Gradually, this technology has expanded throughout cities, states and nations all over the world. 3G networks were initially developed with the intention of forming a standard in the world for telecommunication, and the motive behind developing 4G network is to allow people to access internet independently from devices such as mobile phones. But in order to provide the enhanced facilities, there is need for high security patterns and reliability of system to ensure safe surfing. The security measures should be established in such a way so that it can enable data transmission with minimum risk (Gobjuka, 2009). Security in 4G networks generally consist of verification, privacy, reliability and authorization in order to gain network connectivity. The 4G technology is incorporated with ‘quality of service’ (QoS) and flexibility. Besides, it is also considered that the network terminal of 4G always chooses the best access point available. In the wireless network there are several security breaches that occur such as channel congestion, denial of service (DOS), illegal access, session hijacking and snooping among others. Though the issue of security had been solved mostly through utilizing manifold layers of encryption etiquette, but there are other drawbacks in this system such as unexploited power, wasted energy and greater transmission interruption. In 4G systems the model of interlayer safety network had been developed, where only a single layer is constructed for data encryption (Gardezi, 2006). But 4G needs more development with respect to mobile node (MN) flow while users roam into new telecommunication providerâ⠂¬â„¢s network (Fu, Hogrefe, Narayanan, & Soltwisch, 2004). Problem Statement The research is planned to concentrate on the security issues of 4G on the web. It is quite difficult to quantify the security risks of 4G network and what difficulties it can face from several fronts. There is need to search a definable method to establish a balance between practical application of 4G network and necessary security levels in order to ensure safety of users’ data and resources. Therefore, this research will aim at

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.