logo

Assignment on Wireless Communications

14 Pages1453 Words183 Views
   

Added on  2020-02-24

Assignment on Wireless Communications

   Added on 2020-02-24

ShareRelated Documents
Running head: WIRELESS COMMUNICATIONSWireless communicationsName of the studentName of the UniversityAuthor Note
Assignment on Wireless Communications_1
1WIRELESS COMMUNICATIONSAnswer to question 1:The Worldwide Interoperability for Microwave Access (WiMAX) is widely used for theconnectivity among various devices using the standards of IEEE 802.16. The commontechniques used in this method is the multiple input multiple outputs (MIMO) and orthogonalfrequency division multiplexing (OFDM) techniques (Rengaraju, Lung and Srinivasan 2012).The main standards of the application of encryption purposes are the TripleDES, DES and RC2.TripleDES:This is another symmetric key algorithm process whose operation is the same as that ofthe DES. However, the application is the main difference in these techniques. It applies theencryption techniques for three time using three keys (i, j, k) (Kamali, Bennett and Cox 2012).As the two key methods are vulnerable to the middle key attacks, the presence of three keys arejustified. DES:The Data Encryption Standard (DES) is an encryption standard following a symmetrickey algorithm. Cryptography offers the most widespread use of this algorithm. Thetransformation of a text bit of a specified length to a cipher bit of similar length is the mainfunctions of DES (Rengaraju, Lung and Srinivasan 2012). The method also includes thepresence of a decryption key to be applied. RC2:The symmetric key algorithm made by Ron Rivest is named the RC2. However, the maindifference with the other two is their variable size key bits. It consists of 18 rounds forencryption where 16 of them are of one type and the other two are of another (Kamali, Bennettand Cox 2012). The main two types are either the MIXING or the MASHING.
Assignment on Wireless Communications_2
2WIRELESS COMMUNICATIONSAlgorithmDeveloperKeysizeBlocksizeAlgorithmRoundsCompatibility toWiMAXDESIBM56 bits64 bitsFeistelNetwork16YesTripleDESIBM112 bits64 bitsFeistelNetwork48YesRC2Ron Rivest8-128bits64 bitsHeavysourceFeistelNetwork18YesTable: Comparison between the three standardsAnswer to question 2:The PAN (Personal Area Network) is used to facilitate wireless communications amongthe devices like computers or mobile devices, present near the vicinity of one another.Furthermore, the internet connection can also be provided where one of the device acts like therouter to facilitate connection. The main devices to be considered here is the Bluetooth and theZigBee. Bluetooth:This technology uses the UHF (ultra high frequency) to provide the feature ofconnectivity under a short range. The modulation techniques used by the Bluetooth technology isthe Gaussian Frequency shift keying (GFSK) and 8DPSK.There are many problems and risks in the application of Bluetooth technology due to theadvancements in the modern world (Carpenter, Fowler and Adler 2012). These include thedevice configuration, theft or loss, person-in-the-middle, denial of service and service mapping.
Assignment on Wireless Communications_3
3WIRELESS COMMUNICATIONSThe default configuration of the device is applied by the manufacturer. Due to itscomplex working nature, people often neglect the need for customizing it. This leads to openaccess to the ON mode, the BD_ADDR and clock (Versichele et al. 2012). Unethical attackers inthe vicinity can access the device using these to steal information.Loss of devices is another concern were the presence of paired keys in the device canlead to the attacker getting access to the paired device list to get access and steal information. Person-in-the-middle is another process used by the unethical attackers to get access todevices. Using this technology, an attacker can mimic another device to get access to the list ofdevices it is being connected to. This process is also another known method for informationstealing and eavesdropping. Denial of service is another attack that can be used to negate access to a system.Although, cases for a denial of service attack has not been reported, it can be used to providesignal jamming features and drain out the battery of the device by constantly sendingconnectivity requests. The service mapping is another method where security implications are possible. As adevice searches for another device for connection establishment, the service discovery protocol(SDP) is mainly used to reference such requirements (Versichele et al. 2012). The attackers canget the lists of various devices in the vicinity and get access to them. ZigBee:The main applications of this technique are automation in houses. The main features ofthis technology are the small range connectivity and IEEE 802.15.4 compliance.
Assignment on Wireless Communications_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The WiMAX Technology: A Wireless Communication Protocol
|17
|2296
|458

Compare and contrast three data encryption standards for WiMAX networks?
|4
|1773
|49

Three Data Encryption Standards for WIMAX Networks Part 1: Wireless Networks
|14
|1565
|42

Security Challenges of Two Examples of WPAN Technologies
|10
|2284
|172

Wireless Communication Standard
|10
|1400
|94

Security Challenges of WPAN Technologies
|7
|1282
|84