World Interoperability Assignment PDF

Verified

Added on  2021/06/17

|6
|1956
|35
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Answer 1:-
WiMAX is called as World Interoperability for Microwave Access. WiMAX technology is a
media communication innovation that offers transmission of remote information through
means of various transmission methods, like mobile internet access via multiple hub links. It
is based on IEEE 802.16 standard. This technology is future replacement to traditional links
and Dial Subscriber lines (DSL). Security is constantly essential in information systems
however, it is specially significant in wireless networks such as WiMAX. There are various
data encryption standards to encrypt the confidential information flowing through the
wireless network. Some of them are:-
1. Advanced Encryption standard (AES) is based upon strong algorithm called
Rijndael algorithm which offers solid cryptographic properties. It is quick, simple to
execute in equipment and programming and uses less memory than other algorithms.
AES operates on very fast broad selection with greater efficiency. This algorithm can
work on 128, 192, or 256 bits of keys but for WiMAX it 128 bit. In AES operation
mode is chosen wisely so that there will be no security holes left as it cause potential
threat to the data. Counter mode is used while encrypting the data. An arbitrary block
is firstly encrypted using AES and then outcome is XORed with plain text to get the
cipher text. In counter mode, the blocks are incremented by 1 for every input so that
there will no pattern for two identical inputs. Decryption is done the same way. The
cipher text is XORed two times to get the original value. Counter mode is essential for
parallel encryption of data. (Anonymous, 2017, p.5)
2. Data encryption standard is a symmetric key algorithm in which same key is used
for encryption and decryption of data. It takes 64-bits (8 characters). In this, text is
turned into cipher text with the help of a key and is sent to receiver, then receiver can
decrypt it the same key. But this encryption is not reliable as it can be break by special
tools within no time. This is the reason for introduction of Triple data encryption
standard. It is the three times reiteration of data encryption standard. Means, it takes
192-bits (24 characters). Initially data is encoded with DES algorithm using initial
key, then the encrypted data is decrypted using a different key and the new block is
re-encrypted using original key. It is very slow as compared to DES as it repeated
three times. (Thakur, 2017, p.5)
3. Secure Hash Algorithm (SHA-1) is said to be secure hashing in the US digital
signature standard. It is one of best hashing algorithm that performs one-way

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
encryption. It takes input in 512 bit blocks and produces 160 bit message. This
standard algorithm is used to send the signed message from sender to beneficiary. In
this, text is converted into 160 bit hash using SHA algorithm. At that time sender
signs that hash with RSA private key and both signed hash and text to the beneficiary.
After receiving the message the receiver computes the hash and furthermore applies
key to obtain the original message.
Answer 2-
The deployment of wireless networks has increased rapidly due to increase in data
transmission bandwidth of wireless technology. Nowadays, numerous mobile station use
wireless medium to surf the internet or other services ultimately creating a dense mobile
network. This resulted into competition among mobile stations to take privilege of wireless
network. This will definitely create traffic. To overcome the issue of traffic and overlapping
medium access control (MAC) is used. Carrier sense multiple access (CSMA) denotes
medium access control. CSMA works on the principle that only device can send data at a
time. In CSMA every node is verified the absence of any other nodes before transmission of
data. It basically senses the traffic signals to avoid overlapping of data. In this, transmitter is
put at the receiver’s end; the transmitter gives feedback about any other data transmission.
The additional techniques to get rid of traffic and to get suitable coordination are to use
CSMA with CA i.e collision avoidance. This technique senses the traffic in gateway line and
it sensed busy, it differs the data transmission for a period of time. This reduces the risk of
collision and overlapping. Similarly, CSMA can be used with CD collision detection to check
whether the collision is already happened. (Agardh, 2015, p.5)
Answer 3 –
The Internet of Things (IoT) is the inter-connection of smart devices via internet embedded in
different household objects, enabling these objects to collect and exchange data. Over the
years, definition of IoT has evolved, their product capabilities are increased and now products
can perform tasks beyond their primary function. World has seen a series of innovative
transformations from cars to office buildings to home appliances. Internet of things products
have developed from simple physical components to complex products that consists of
Document Page
sensors, actuators, processors and many more things. Today, IoT products are both
technologically and financially feasible. Internet of things is connecting more gadgets
consistently and we’re headed to a world that will have 30 billion IoT gadgets by 2022. Now,
be it a house owner or car owner or a building owner everything is now built with smart
things to reduce the power consumption and get the better result out of it. The development
of IoT conveys a few advantages, as it will change the way individual do ordinary
undertakings and conceivably change the world. Having a shrewd will definitely fascinate
your guests and yet good management of lighting can lower your electric bill.
Types of wireless technology that uses IoT devices:
Zigbee- It is open wireless network used specifically in Machine to machine (M2M)
networks. It is the type of affordable and inexpensive technology that uses less power
often used in many industrial applications. This technology has low delay times i.e.
low latency and low obligations cycle enabling products to amplify battery life.
WiMax – It is the acronym for Worldwide Interoperability for Microwave access. It is
a remote innovation in which information can be exchanged at the rate of 40-45
megabits for each second. It is based on IEEE 802.16 benchmarks. It can be utilized
both in inside and outside however it gives better flag when utilized outside.
With the increasing number of IoT users’ security and privacy are major concerns.
Some of the security issues are :
Open perception – This is the primary issue the makers address. In 2016, a
study of smart homes shows that 44 percent of the Australians were worried of
their private information being stolen from dwelling home. That’s why they
ignore to buy the smart gadgets.
Powerlessness to Hacking Possessed with the ability of hacking
impersonators can get into genuine, accessible devices which infer
impersonators have the capability to get into vulnerabilities again and again.
For instance, scientists found a lot of openings i.e. vulnerabilities in Samsung
brilliant things and the methods were long route from complex. (Eastwood,
2017, p.5)
Software Update – Day by day internet of things is turning into reality things,
significantly greater security is required. Anyway, paying no attention to the
chance that you start thinking about security, new device making companies
Document Page
are unnecessarily overbearing about the risks. In like manner, one issue is that
associations don’t bring back to life their appliances enough or by any stretch
out of the inventive vitality. Devices were secured when consumer first
purchased it, now it can turn dangerous as programmers’ detected new
passiveness.
Shielding your information from owner companies – Hackers are alarming,
yet they are far from web of things. Frankly, the companies which make these
kind of products can utilize these gadgets to get the solitary information and it
is dangerous when used for bank transactions.
Solutions to security issues:-
1. There are noxious individuals who bargain your protection through attacking your
Internet of Things, (for example, your cell phones, switches, web based cameras, and
so on.). By following the beneath basic Internet of Things home security and
protection arrangements, user can keep malignant assaults under control.
2. Creating strong passwords for IoT software so that hackers will not be able to intrude
your dwelling smart products. (Elvia, 2017, p.5)
3. Purchasing IoT products from trusted owners. Trusted owners test their products so
vigilantly that it will be difficult for hackers to invade their products easily.
4. Updating the software/hardware products will install the latest protection for your
products. Impersonators always look for the holes and flaws to hack into the secured
systems.
5. Encryption of data should be done to maintain the privacy of confidential information.
Internet of things is growing rapidly and is serving more devices reliably. By 2022, the world
will have around 30 billion IoT users. Presently, be it a house proprietor or auto proprietor or
a building proprietor everything is presently working with splendid things to decrease the
power usage and show signs of improvement result out of it. Internet of things is taking over
the world with its fascinating devices that provide comforts and conceivably changing the
world.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
Anonymous, 2017. WiMAX Security. [Online] Available at:
http://www.radio-electronics.com/info/wireless/wimax/security-encryption-
authentication.php.[Accessed: 8 March 2018].
Thakur, D. (2017). SHA-1 - What is Secure Hash Algorithm-l (SHA-1)? [Online] Available at:
http://ecomputernotes.com/computernetworkingnotes/security/sha-1.[Accessed: 8 March
2018].
Agardh, K (2015). Method and apparatus for traffic pattern dependent access coordination to a
shared transmission medium. [Online] Available
at:https://patents.google.com/patent/WO2017008842A1. [Accessed: 8 March 2018].
Eastwood, G. (2017). 4 critical security challenges facing IoT. [Online] Available at:
https://www.networkworld.com/article/3166106/internet-of-things/4-critical-security-
challenges-facing-iot.html. [Accessed: 8 March 2018].
Elvia, (2017). Workable Solutions to Internet of Things Home Security and Privacy
Issues/Concerns. [Online] Available at:https://reolink.com/solutions-to-internet-of-
things-home-security-privacy-issues-concerns/. [Accessed: 8 March 2018].
Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today's intranet of things to a
future internet of things: a wireless-and mobility-related view. IEEE Wireless
Communications, 17(6).
Elarabi, T., Deep, V., & Rai, C. K. (2015, December). Design and simulation of state-of-art
ZigBee transmitter for IoT wireless devices. In Signal Processing and Information
Technology (ISSPIT), 2015 IEEE International Symposium on(pp. 297-300). IEEE.
Document Page
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]