Your contribution can guide someone’s learning journey. Share your
documents today.
Answer 1:- WiMAXis called as World Interoperability for Microwave Access. WiMAX technology is a media communication innovation that offers transmission of remote information through means of various transmission methods, like mobile internet access via multiple hub links. It is based on IEEE 802.16 standard. This technology is future replacement to traditional links and Dial Subscriber lines (DSL). Security is constantly essential in information systems however, it is specially significant in wireless networks such as WiMAX. There are various data encryption standards to encrypt the confidentialinformation flowing through the wireless network. Some of them are:- 1.Advanced Encryption standard (AES)is based upon strong algorithmcalled Rijndael algorithm which offers solid cryptographic properties. It is quick, simple to execute in equipment and programming and uses less memory than other algorithms. AES operates on very fast broad selection with greater efficiency. This algorithm can work on 128, 192, or 256 bits of keys but for WiMAX it 128 bit. In AES operation mode is chosen wisely so that there will be no security holes left as it cause potential threat to the data. Counter mode is used while encrypting the data. An arbitrary block is firstly encrypted using AES and then outcome is XORed with plain text to get the cipher text. In counter mode, the blocks are incremented by 1 for every input so that there will no pattern for two identical inputs. Decryption is done the same way. The cipher text is XORed two times to get the original value. Counter mode is essential for parallel encryption of data.(Anonymous, 2017, p.5) 2.Data encryption standardis a symmetric key algorithm in which same key is used for encryption and decryption of data. It takes 64-bits (8 characters). In this, text is turned into cipher text with the help of a key and is sent to receiver, then receiver can decrypt it the same key. But this encryption is not reliable as it can be break by special tools within no time. This is the reason for introduction ofTriple data encryption standard.It is the three times reiteration of data encryption standard. Means, it takes 192-bits (24 characters). Initially data is encoded with DES algorithm using initial key, then the encrypted data is decrypted using a different key and the new block is re-encrypted using original key. It is very slow as compared to DES as it repeated three times. (Thakur, 2017, p.5) 3.Secure Hash Algorithm (SHA-1)is said to be secure hashing in the US digital signature standard. It is one of best hashing algorithmthatperforms one-way
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
encryption. It takes input in 512 bit blocks and produces 160 bit message. This standard algorithm is used to send the signed message from sender to beneficiary. In this, text is converted into 160 bit hash using SHA algorithm. At that time sender signs that hash with RSA private key and both signed hash and text to the beneficiary. After receiving the message the receiver computes the hash and furthermore applies key to obtain the original message. Answer 2- Thedeploymentofwirelessnetworkshasincreasedrapidlyduetoincreaseindata transmission bandwidth of wireless technology. Nowadays, numerous mobile station use wireless medium to surf the internet or other services ultimately creating a dense mobile network. This resulted into competition among mobile stations to take privilege of wireless network. This will definitely create traffic. To overcome the issue of traffic and overlapping medium access control (MAC) is used. Carrier sense multiple access (CSMA) denotes medium access control. CSMA works on the principle that only device can send data at a time. In CSMA every node is verified the absence of any other nodes before transmission of data. It basically senses the traffic signals to avoid overlapping of data. In this, transmitter is put at the receiver’s end; the transmitter gives feedback about any other data transmission. The additional techniques to get rid of traffic and to get suitable coordination are to use CSMA with CA i.e collision avoidance. This technique senses the traffic in gateway line and it sensed busy, it differs the data transmission for a period of time. This reduces the risk of collision and overlapping. Similarly, CSMA can be used with CD collision detection to check whether the collision is already happened.(Agardh, 2015, p.5) Answer 3 – The Internet of Things (IoT) is the inter-connection of smart devices via internet embedded in different household objects, enabling these objects to collect and exchange data. Over the years, definition of IoT has evolved, their product capabilities are increased and now products can perform tasks beyond their primary function. World has seen a series of innovative transformations from cars to office buildings to home appliances. Internet of things products have developed from simple physical components to complex products that consists of
sensors,actuators,processorsandmanymorethings.Today,IoTproductsareboth technologically and financially feasible. Internet of things is connecting more gadgets consistently and we’re headed to a world that will have 30 billion IoT gadgets by 2022. Now, be it a house owner or car owner or a building owner everything is now built with smart things to reduce the power consumption and get the better result out of it. The development of IoT conveys a few advantages, as it will change the way individualdo ordinary undertakings and conceivably change the world. Having a shrewd will definitely fascinate your guests and yet good management of lighting can lower your electric bill. Types of wireless technology that uses IoT devices: Zigbee- It is open wireless network used specifically in Machine to machine (M2M) networks. It is the type of affordable and inexpensive technology that uses less power often used in many industrial applications. This technology has low delay times i.e. low latency and low obligations cycle enabling products to amplify battery life. WiMax – It is the acronym for Worldwide Interoperability for Microwave access. It is a remote innovation in which information can be exchanged at the rate of 40-45 megabits for each second. It is based on IEEE 802.16 benchmarks. It can be utilized both in inside and outside however it gives better flag when utilized outside. With the increasing number of IoT users’ security and privacy are major concerns. Some of the security issues are : Open perception– This is the primary issue the makers address. In 2016, a study of smart homes shows that 44 percent of the Australians were worried of their private information being stolen from dwelling home. That’s why they ignore to buy the smart gadgets. PowerlessnesstoHacking–Possessedwiththeabilityofhacking impersonatorscangetintogenuine,accessibledeviceswhichinfer impersonators have the capability to get into vulnerabilities again and again. For instance, scientists found a lot of openings i.e. vulnerabilities in Samsung brilliant things and the methods were long route from complex. (Eastwood, 2017, p.5) Software Update– Day by day internet of things is turning into reality things, significantly greater security is required. Anyway, paying no attention to the chance that you start thinking about security, new device making companies
are unnecessarily overbearing about the risks. In like manner, one issue is that associations don’t bring back to life their appliances enough or by any stretch out of the inventive vitality. Devices were secured when consumer first purchased it, now it can turn dangerous as programmers’ detected new passiveness. Shielding your information from owner companies– Hackers are alarming, yet they are far from web of things. Frankly, the companies which make these kind of products can utilize these gadgets to get the solitary information and it is dangerous when used for bank transactions. Solutions to security issues:- 1.There are noxious individuals who bargain your protection through attacking your Internet of Things, (for example, your cell phones, switches, web based cameras, and so on.). By following the beneath basic Internet of Things home security and protection arrangements, user can keep malignant assaults under control. 2.Creating strong passwords for IoT software so that hackers will not be able to intrude your dwelling smart products.(Elvia, 2017, p.5) 3.Purchasing IoT products from trusted owners. Trusted owners test their products so vigilantly that it will be difficult for hackers to invade their products easily. 4.Updating the software/hardware products will install the latest protection for your products. Impersonators always look for the holes and flaws to hack into the secured systems. 5.Encryption of data should be done to maintain the privacy of confidential information. Internet of things is growing rapidly and is serving more devices reliably. By 2022, the world will have around 30 billion IoT users. Presently, be it a house proprietor or auto proprietor or a building proprietor everything is presently working with splendid things to decrease the power usage and show signs of improvement result out of it. Internet of things is taking over the world with its fascinating devices that provide comforts and conceivably changing the world.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References Anonymous, 2017.WiMAX Security.[Online] Available at: http://www.radio-electronics.com/info/wireless/wimax/security-encryption- authentication.php.[Accessed: 8 March 2018]. Thakur, D. (2017).SHA-1 - What is Secure Hash Algorithm-l (SHA-1)?[Online] Available at: http://ecomputernotes.com/computernetworkingnotes/security/sha-1.[Accessed:8March 2018]. Agardh, K (2015). Method and apparatus for traffic pattern dependent access coordination to a sharedtransmissionmedium.[Online]Available at:https://patents.google.com/patent/WO2017008842A1. [Accessed: 8 March 2018]. Eastwood, G. (2017).4 critical security challenges facing IoT.[Online] Available at: https://www.networkworld.com/article/3166106/internet-of-things/4-critical-security- challenges-facing-iot.html. [Accessed: 8 March 2018]. Elvia, (2017). Workable Solutions to Internet of Things Home Security and Privacy Issues/Concerns. [Online] Available at:https://reolink.com/solutions-to-internet-of- things-home-security-privacy-issues-concerns/. [Accessed: 8 March 2018]. Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today's intranet of things to a future internet of things: a wireless-and mobility-related view.IEEE Wireless Communications,17(6). Elarabi, T., Deep, V., & Rai, C. K. (2015, December). Design and simulation of state-of-art ZigBee transmitter for IoT wireless devices. InSignal Processing and Information Technology (ISSPIT), 2015 IEEE International Symposium on(pp. 297-300). IEEE.