Wednesday, May 6, 2020

Wireless Networking Concept Samples †MyAssignmenthelp.com

Question: Discuss about the Wireless Networking Concept. Answer: Data Encryption Standards for WiMAX 3DES and AES are the most popular encryption standards that are being used to encrypt data that are being transferred in the WiMAX network. Worldwide Interoperability for Microwave Access (WiMAX) can be stated as a union of the organizations that are contributing in the development and manufacture of wireless gadgets in manner to improve and enhance the standards for Broadband like networks (Hassan Bach, 2014). The 3DES (Triple Data Encryption Standard) has been using three different and various keys that are of the length 56-bit each however, these could slow down the actual performance in some of the software. Therefore 3DES becomes obsolete because of the contribution in making the performance slow and limited length of the keys. This lead to the necessity of another encryption standard and now AES (Advanced Encryption Standard) has become the main tool for the encryption of data while travelling or being transferred through WiMAX network. AES is capable of providing 256-bit, 192 -bit, and 128-bit encryption keys for the encryption of the data (Ravishankar, et al., 2017). It was evolved through inheriting CCMP standard and became one of the most popular standards. In comparison with the triple data encryption standards AES is much faster and much easier to be implemented and used and it also required very less memory in comparison. There are the possibilities that it might not be able to used by all end-user terminals but it does requires dedicated processors on board the BS (Eren, 2014). This result it as the most vital encrypting tool that can be used in the WiMAX Network. The third chosen encryption standard is (Rivest Shamir Adleman)RSA that can be described as a public-key asymmetric algorithm for the encryption that can also be used to encrypt through using the SS public key in manner to protect the Authorisation Reply message. The Authorisation Reply message includes an algorithm key named AK (Authorisation Key) that is also can also be used to encryp t the traffic messages or can be used as traffic encryption keys during the transfer of the messages to the SS from the BS (Ahmad Ismail, 2016). Among the DES, 3DES, AES and RSA the more effective and easy encryption standard is the AES that can be implemented during transferring the data or information or file via WiMAX network. In comparison with the Security Associations (SAs), it can also be stated that this is the most secured encrypting algorithm that could be used to encrypt the data and keep them safe. Based on the complexity AES is the simplest encrypting algorithm (Nomula, Rafai verma, 2016). Security challenges faced by examples of WPAN Technology There are various examples of the WPAN technology that could be implemented while being connected with a network or using a network the most common networks are Bluetooth and ZigBee network that has been chosen for the answer of this question. Wireless technology faces many of the issues related to the security and similarly these technologies also faces certain security issues that can be listed as: Security issues related to the application of the Bluetooth network can be listed as: Denial of service DoS is one of the simple data breaching coding that could resist the user or even disallows the user to connect to the network through sending various requests at the same moment through different or single supplication. This attack could lead to the crashing of the device, communication blocked, battery consumption and many more uncertainties that result in serious damage to the user (Padgette, 2017). Bluesnarfing: This is also one of the simple coding in the dictionary of the hackers that let the intruder access to the information and data that is saved into the device through pairing with the device. There are certain applications available on the internet that can let it happen and even an individual can make calls and message using Bluetooth network from other devices (Al-Janabi et al., 2017). Eavesdropping This manner of attack allows the intruder to sniff the surrounding through which the signal is passing through the Bluetooth network and could be able to explore the signal that is being travelling through the network. This could lead to both the privacy and security issues for the user using Bluetooth network. Blue bugging This is an attack that allows the user to remotely access other devices and could easily manipulate the activities of the device through further coding. This could even send messages either text or voice and select any option makes the device vulnerable to be used by its owner. Following is a list describing the security issues related to the ZigBee network: Sniffing: It is a technique that allows intruders to sniff the improper coding to the network in manner to encrypt the system with improper coding and affect the information being saved on the network (Misra et al., 2016). Replay attack: this is another way of attacking the information I which the intruder records the message travelling during the traffic and after an instance replays the recorded information along with the malicious code. Physical Attacks: One of the most common attacks for any network and in this network hampering is made after locating the devices. General way for leading this attack is Hard coded encryption keys which are loaded in the RAM are often employed by radios operating in the ZigBee network once the device is powered. Energy Harvesting The first paper by Fisal and Sherali (2016) introduced that WSNs (Wireless Sensor Networks) technology has been recently started to receive the recognition as a key enabling technique for the computing areas that are emerging pervasive in this sector. The wireless sensor networks have been continuously attracting the attention of various stakeholders including the design and the way of implementation. The author developed a comprehensive classification scheme for techniques of energy harvesting that leveraged the external sources and ambient environment for generating through wireless sensor networks. The author has thoroughly reviewed the mechanism of energy harvesting and produced the technique that could be favorable in harvesting the energies. They stated that it is worth nothing that very source of energy has different capabilities of harvesting, and that results in the harvester hardware design that is also different for each category that could be helpful in determining the ef ficiency of the harvester. On the basis of findings and survey made by them they have concluded that It is worth noting that each energy source has different harvesting capabilities and, as a result, the harvester hardware design is also different for each category which ultimately determines the efficiency of the harvester (Faisal and sherali, 2016). Another article proposed by Ulukus et al. (2015) states about the techniques and mechanism of energy harvesting wireless communications. The authors have emphasized on the emergence of the model of energy cooperation and transfer, which could have made possibility through harnessing the energy, from the transfer of the messages or information through the wireless network. Various topics had been covered by the authors concerning the physical layer of the performance and the informational-theoretical medium access control protocol. They have concluded that the threats faced by energy harvesting from physical and practical concerns has m ade this technique face new challenges and the discussion of the energy and information transfer provides exciting possibilities that can be adapted in the future to adapt the network operations with improved performance. References: Ahmad, R., Ismail, W. (2016). Performance Comparison of Advanced Encryption Standard-128 Algorithms for WIMAX Application with Improved Power-Throughput.Journal of Engineering Science and Technology,11(12), 1-17. Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., Shamshirband, S. (2017). Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications.Egyptian Informatics Journal,18(2), 113-122. Eren, E. (2014). SECURITY ASSESSMENT OF IEEE 802.16 (WIMAX)A SHORT COMPARISON BETWEEN IEEE 802.16 d AND 802.16 e.International Journal of Computing,7(2), 91-99. Hassan, A., Bach, C. (2014, April). WiMAX Basics From Deployments to PHY Improvements. ASEE. Misra, S., Goswami, S., Taneja, C., Mukherjee, A. (2016). Design and implementation analysis of a public key infrastructure?enabled security framework for ZigBee sensor networks.International Journal of Communication Systems,29(13), 1992-2014. Nomula, R., Rifai, M. E., Verma, P. (2016). Multi-photon tolerant protocols for quantum secure communication in wireless standards.International Journal of Security and Networks,11(1-2), 25-36. Padgette, J. (2017). Guide to bluetooth security.NIST Special Publication,800, 121. Ravishankar, C., Zakaria, G., Benammar, N., Corrigan, J. (2017).U.S. Patent No. 9,722,789. Washington, DC: U.S. Patent and Trademark Office. Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016): 1041-1054. Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.