Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR WIRELESS NETWORKS SECURITY: A SURVEY

    Abstract

    Ever since internet became a common medium and source of communication, the wireless networks have grown rapidly. The data transfers across multiple devices over the networks, access to multiple devices made wireless networks an important choice and high in demand. The increasing importance and applications of these networks made them highly susceptible to security attacks and threats. The traditional security methods available are not sufficient to address these ever increasing threats and attacks. In this survey we presented the drawbacks of traditional security measures, reflected on various security attacks on the wireless networks. Further we reviewed the work presented by various researchers on the efficiencies, drawbacks of various machine learning and deep learning methods used in wireless security. By conducting a systematic review of the available literature we concluded ML and DL techniques are very effective in securing wireless networks. In the process we identified the research gaps and identified areas of possible future research.

    Reviewer Photo

    Priyank Mohan Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Priyank Mohan Reviewer

    11 Oct 2024 05:33 PM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The topic addressed in this paper is of considerable relevance, particularly in today's digital age, where wireless networks serve as the backbone for communication and data transfer. The rapid expansion of these networks increases their susceptibility to various security threats, making the examination of effective security measures crucial. The paper’s focus on the limitations of traditional security methods and the potential of ML and DL techniques to address these vulnerabilities showcases its originality. However, to further enhance its innovative contribution to the field, the paper could propose new frameworks or methodologies for implementing ML and DL solutions that go beyond the existing discussions in the literature.


    Methodology

    The methodology adopted in this study appears to involve a systematic literature review, a fitting approach for synthesizing existing research and identifying trends within the domain of wireless security. To strengthen the methodology, the paper should provide more details regarding the selection criteria for the literature reviewed, such as the types of studies included, their publication years, and any geographic focus. Additionally, elucidating the methods used for synthesizing the findings, whether qualitative or quantitative, would enhance the robustness of the research. Incorporating a structured framework for evaluating the effectiveness of various ML and DL techniques could also provide valuable insights and comparisons among different approaches.


    Validity & Reliability

    Regarding validity, the conclusions regarding the effectiveness of ML and DL techniques in enhancing wireless network security appear well-founded, especially if backed by a thorough review of studies demonstrating their applications. However, the paper should address potential biases that may exist in the literature, such as a focus on specific attack vectors or particular types of wireless systems. Discussing the limitations of the studies included in the review would also bolster the reliability of the research findings. By acknowledging these factors, the paper would enhance its credibility and provide a more balanced perspective on the efficacy of ML and DL methods.


    Clarity and Structure

    The clarity of the writing is generally commendable, but the paper could benefit from simplifying some complex technical jargon to enhance accessibility for a broader audience. Clearly defining key terms, particularly specific ML and DL techniques, would facilitate understanding and engagement with the material. In terms of structure, the paper would be improved by incorporating more subheadings to guide the reader through the various sections, such as discussions on traditional security measures, the application of ML and DL techniques, and the identification of research gaps. A clear introductory section outlining the structure and purpose of the paper would also aid readers in navigating the content.


    Result Analysis

    The depth of analysis regarding the effectiveness of ML and DL techniques in securing wireless networks is a notable strength of this paper. However, to further enhance the discussion, the paper should include a more detailed examination of specific ML and DL algorithms utilized, along with their performance metrics and relevant real-world applications. By providing concrete examples and case studies, the analysis would gain more depth and offer practical insights into the implementation of these techniques. Additionally, articulating specific future research directions would strengthen the conclusion, guiding readers toward important questions or areas that warrant further investigation, along with suggested methodologies or technologies to explore.

    Publisher Logo

    IJ Publication Publisher

    ok sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Priyank

    Priyank Mohan

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    JETIR - Journal of Emerging Technologies and Innovative Research External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2349-5162

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp