2 WIRELESS NETWORKING CONCEPTS Answer 1 WiMAX or Worldwide Interoperability for Microwave Access is an IEEE 802.16 set of standards based standard of wireless communication. It provides options for controlling multiple physical layer and media access. The three encryption standards that is used by WiMax technology is triple DES or 3DES, AES and RSA. The triple data encryption standard makes use of three different encryption keys, each of 56 bits for encryption. In AES or Advanced Encryption standard the keys of 128-bit, 192-bit or 256-bit encryption keys are used for encryption. RSA or public key encryption technique that makes use of both public and private key decrypting and encrypting a particular input, is used in WiMax as well. The comparison among the different WiMax technologies is as follows (Singh, 2013)- Characteristics3DESAESRSA Definition3DES is asymmetric block cipher that applies DES algorithm 3 times in an input in order to encrypt a data (Adhie et al., 2018). Advanced encryption standard is a symmetric block cipher that makes use of 128bits block length and key lengths of 128 bits, 192 bits and 256 bits. RSA is also known as a publickeytechnology ofencryptionthatis developed by RSA data security. It makes use of primefactorizationas thebaseofdata encryption Key sizeThree keys of 56 bitsAES make use of keys of 128, 192 and 256 bit keys (Aleisa, 2015). 2048 bit keys are more popular for use with RSA Computation timeComputation time is least in 3DES; however, AES provides the highest speed ratio of RSA is the most time consuming methods of
3 WIRELESS NETWORKING CONCEPTS there is very minor difference between 3DES and AES. encryption, however, the speed decreases with the increase in the input size file encryption (Thambiraja, Ramesh & Umarani, 2012). Memory UsageHas lesser memory usage in comparison to RSA but consumes higher memory in comparison to AES. AES has least memory usage High memory usage PerformancePerformance of 3DES is comparatively much better than DES AES performs better in comparison to 3DES and RSA Performance level of RSA is lower in comparison to 3DES and AES. Table 1: Showing the comparison among 3Des, AES and RSA
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 WIRELESS NETWORKING CONCEPTS Answer 3 With the emergence of wireless networking, there has been a constant increase in adoption of long range applications that have high speed. The demand of these technologies has considerably increased over the years. The popular demand to develop networking of low power and low data has resulted in the formation of Zigbee technology. Not only the wireless networks, but also the use of internet of things has considerably increased. However, there are certain challenges associated with the use of Internet of things (IOT) and wireless. The challenges associated with the IOT and wireless technology can be mitigated by taking proper measures. Zigbee is one of the most widely adopted wireless communication technology. It is an application specification for high level of communication, which can be achieved in a very low power and low cost. The technology of Zigbee is based on IEEE 802.15.4 standard for the Personal Area Network (Elarabi, Deep & Rai, 2015). Zigbee alliance maintains the Zigbee technology. A transmitter in Zigbee mainly consists of four blocks, which are CRC, Bit-to- symbol, Symbol,-to-chip and O-QPSK modulator. The error detection technique of cyclic redundancy check is associated with the Zigbee technology in order to evaluate the error in the codes. Addressing the error in the codes is essential for reducing the data security risks associated with the use of Zigbee. The main aim of IOT technology is to connect the smart things together in order to provide a chance for enabling a rich set of evolutionary along with the revolutionary applications and the services (Zorzi et al., 2010). Further researches in the field of IOT can make it possible to interact or communicate with the environment, in order to receive the information in its status. IOT is a new and emergent technology as the term was coined more 10 years ago. From that
5 WIRELESS NETWORKING CONCEPTS time, there has been a considerably research and studies associated with the use of internet of things. However, one of the key elements that can possibly make the IOT paradigm successful is its ability of integration of different types of devices, technologies and services.
6 WIRELESS NETWORKING CONCEPTS References Adhie, R. P., Hutama, Y., Ahmar, A. S., & Setiawan, M. I. (2018, January). Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC). InJournal of Physics: Conference Series(Vol. 954, No. 1, p. 012009). IOP Publishing. Aleisa, N. (2015). A Comparison of the 3DES and AES Encryption Standards.International Journal of Security and Its Applications,9(7), 241-246. Elarabi, T., Deep, V., & Rai, C. K. (2015, December). Design and simulation of state-of-art ZigBee transmitter for IoT wireless devices. InSignal Processing and Information Technology (ISSPIT), 2015 IEEE International Symposium on(pp. 297-300). IEEE. Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications,67(19). Thambiraja, E., Ramesh, G., & Umarani, D. R. (2012). A survey on various most common encryption techniques.International journal of advanced research in computer science and software engineering,2(7). Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today's intranet of things to a future internetofthings:awireless-andmobility-relatedview.IEEEWireless Communications,17(6).