Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR WIRELESS NETWORKS SECURITY: A SURVEY

    Abstract

    Ever since internet became a common medium and source of communication, the wireless networks have grown rapidly. The data transfers across multiple devices over the networks, access to multiple devices made wireless networks an important choice and high in demand. The increasing importance and applications of these networks made them highly susceptible to security attacks and threats. The traditional security methods available are not sufficient to address these ever increasing threats and attacks. In this survey we presented the drawbacks of traditional security measures, reflected on various security attacks on the wireless networks. Further we reviewed the work presented by various researchers on the efficiencies, drawbacks of various machine learning and deep learning methods used in wireless security. By conducting a systematic review of the available literature we concluded ML and DL techniques are very effective in securing wireless networks. In the process we identified the research gaps and identified areas of possible future research.

    Reviewer Photo

    Hemant Singh Sengar Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Hemant Singh Sengar Reviewer

    11 Oct 2024 05:40 PM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The article addresses a critical issue in today’s digital landscape: the security of wireless networks. Given the rapid growth of internet connectivity and the increasing reliance on wireless communication, this topic is highly relevant. The originality of the paper lies in its focus on the limitations of traditional security measures and the exploration of machine learning (ML) and deep learning (DL) techniques as modern solutions. By presenting a systematic review of existing literature, the article contributes to the ongoing discourse on enhancing wireless security, making it a valuable resource for researchers and practitioners alike.


    Methodology

    The methodology employed in the article includes a systematic literature review, which is appropriate for assessing the current state of research in wireless security. This approach allows for a comprehensive evaluation of existing studies on traditional security measures, as well as ML and DL techniques. However, to enhance the methodology, it would be beneficial to specify the criteria for selecting the reviewed literature, such as the time frame, databases used, and the specific types of studies included. Additionally, a detailed description of the analytical framework used to evaluate the effectiveness of ML and DL methods in wireless security would strengthen the methodology.


    Validity & Reliability

    The validity of the article is supported by the comprehensive review of existing literature, which provides a solid foundation for the claims made about the inadequacies of traditional security measures and the effectiveness of ML and DL techniques. To improve reliability, the article could incorporate quantitative data or case studies demonstrating the practical applications of these techniques in real-world scenarios. Including statistics on the frequency of security breaches in wireless networks and how ML/DL techniques have mitigated these risks would add empirical support to the claims made. Furthermore, addressing the limitations of ML and DL methods, such as potential biases or data quality issues, would provide a more balanced perspective.


    Clarity and Structure

    The article is generally clear and well-structured, presenting the issues with traditional security methods followed by an exploration of ML and DL techniques. However, the clarity could be enhanced by using subheadings to delineate different sections, such as "Drawbacks of Traditional Security Measures," "Security Attacks on Wireless Networks," and "Machine Learning and Deep Learning Solutions." This would guide the reader through the text more effectively. Additionally, including a summary of key points at the end of each section could reinforce the main ideas and improve overall readability.


    Result Analysis

    The analysis of the effectiveness of ML and DL techniques in securing wireless networks is a key strength of the paper. The identification of research gaps and potential areas for future research adds significant value to the discussion. To further enhance the result analysis, the article could provide specific examples of successful implementations of ML and DL techniques in wireless security, highlighting the outcomes and benefits observed. Additionally, discussing the challenges and limitations these technologies face in real-world applications would provide a more nuanced understanding of their effectiveness. Offering recommendations for future research, such as exploring hybrid approaches that combine traditional and modern techniques, would also be beneficial for advancing the field.

    Publisher Logo

    IJ Publication Publisher

    ok sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Hemant Singh

    Hemant Singh Sengar

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    JETIR - Journal of Emerging Technologies and Innovative Research External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2349-5162

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp