logo

Assignment Wireless Networking Concepts

12 Pages1000 Words32 Views
   

Added on  2020-04-07

Assignment Wireless Networking Concepts

   Added on 2020-04-07

ShareRelated Documents
Running head: WIRELESS NETWORKING CONCEPTSWireless Networking ConceptsName of the StudentName of the UniversityAuthor’s noteTable of Contents
Assignment Wireless Networking Concepts_1
1WIRELESS NETWORKING CONCEPTSIntroduction....................................................................................................................11. Encryption methods of Wi-Max.................................................................................12. Wireless Personal Area Network and its security challenges....................................23. Review of two research papers..................................................................................24. Telestra presentation file............................................................................................3Conclusion......................................................................................................................9References....................................................................................................................10
Assignment Wireless Networking Concepts_2
2WIRELESS NETWORKING CONCEPTSIntroductionThe report will highlight Wi-Max encryption methods, WPAN security challenges,two journal articles’ reviews and Telestra getting benefits from the wireless cellular network.1. Encryption methods of Wi-MaxWi-Max has three encryption methods and they are AES, EAP and PKMv2.PKMv2:This protocol has the varied properties and it contains the mutualauthentication. This mutual authentication is carried out by integrating the message integrityalgorithms, EAP-based protocols and RSA-based protocols, and key management protocols(Sharma & Singh, 2017). The protocol is utilized for the authentic exchange of thecryptographic keys for broadcast traffic and multicast traffic.AES:Advanced Encryption Standard is based on Rijndael algorithm. This encryptionmethod is agile and can be configured with ease. It also requires less memory compared to allother encryption standards like PKMv2 or 3DES. Thus all of them prefer this key because ofall these advantageous features. The algorithm works on the 128-bit block size of data andthis block size of data are arranged in a 4x4 array of bytes and this arrangement is calledstate. This standard is used to encipher over the air traffic.EAP: EAP protocol is used to connect a computer to the Internet, the authenticationprocedure that is used and supported by EAP are public key encryption authentication, tokencards, smart cards and one-time passwords. The user requests for connection to the wirelessnetwork via an access point (Sharma & Singh, 2017). The access point asks for ID from theuser and transfers data to the authorized users’ server.
Assignment Wireless Networking Concepts_3
3WIRELESS NETWORKING CONCEPTS2. Wireless Personal Area Network and its security challengesThe security challenges faced are-DDoS attacks: DDoS attacks sabotage one's computer and take the ownership of thecomputer system thus steal the sensitive information of the computer this kind of attack isvery common and this attack generally occurs in insecure wireless personal area network(Achary & Lalseta, 2017). The customers may be unaware that their system has been hacked,when they try to enter their system they will find out that their database and the system havebeen hacked. This can also lead to the shutdown of one's server computer as well.Malware attack: The intruders attack one’s computer system via insecure network viavirus attacks. The virus installed into one’s system can steal one’s data, can alter one’s dataand can even destroy one’s files resides in the customer data as well.3. Review of two research papersFirst paper review: Wireless Sensor Networks is gaining prominence due to theenhancement of Internet of Things as well as Cyber-Physical Systems. In this paper, theeffective harvesting system to use the power of WSN technology for WSN environment hasbeen showcased. Various energy predictions models have been prescribed in this paper thathas the capability to embellish the energy harvested in Wireless Sensor Network (Shaikh &Zeadally, 2016). This paper has also highlighted the issues that need to be detected toembellish the harvesting system for the WSN environment so that the system can be utilizedin profitable and effective manner.Second paper review: This paper has highlighted the energy that is harvesting thewireless communications. All the aspects of the wireless networks like network issues,energy harvesting nodes, transmission scheduling policies, resource allocation and harvesting
Assignment Wireless Networking Concepts_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
WiMAX Networks Security Report
|3
|1235
|48

Report on Data Encryption Standards for WiMAX networks
|9
|1865
|56

Wpan technology Assignment
|6
|928
|23

Wireless Technology Assignment
|19
|1711
|113

Analyze the Security Challenges of WPAN Technologies
|13
|1888
|153

The Wireless Networking Concepts | Assignment
|11
|2764
|62