logo

Introduction to the Concept on Wireless Networking

7 Pages1309 Words50 Views
   

Added on  2020-04-01

Introduction to the Concept on Wireless Networking

   Added on 2020-04-01

ShareRelated Documents
Running head: WIRELESS NETWORKING CONCEPTWireless networking ConceptName of the StudentName of the UniversityAuthor’s Note
Introduction to the Concept on Wireless Networking_1
1WIRELESS NETWORKING CONCEPT1. Worldwide Interoperability for Microwave Access (WiMax) depicts the servicesprovided over a long distance by wireless broadband access. WiMax provides both point-to-pointand multipoint applications to different networks in the market. The applocatioms of the WiMaxhae helped in maintaining the security if the data and information over the network. The WiMaxhas a secure security protocol having three data encryption technique. The three data encryptiontechnique has been discussed below:AESThe Advanced Encryption Standard (AES) is an algorithm that has been approved by theUS government. It works on a degree proficient in 128-piece frame. It uses 192 and 256 bits keysfor encryption process. The purpose of the AES is to provide an advanced level of security to thedata and information in the WiMax. The use of the AES have held in maintaining the truestandard of encoding data and information in the private sector. Triple DESA triple DES provide original Data Encryption Standard (DES) algorithm that restrictsthe hackers from vanishing the data and information in the network. The triple DES is animportant standard that helps in utilizing the symmetric algorithm in various businessorganization. This encryption standard uses 56 bits each keys (Ponniah, Hu & Kumar, 2016).The overall length of the key is 168 bits. However, various specialist suggest 112-bit key is moresimilar to it.RSA
Introduction to the Concept on Wireless Networking_2
2WIRELESS NETWORKING CONCEPTRSA is an algorithm that utilizes asymmetric key encryption over the internet. The RSAalgorithm helps in encrypting and decrypting messages in the network. The plain text isconverted into cipher text that is in encrypted form. Unlike Triple DES, RSA uses two keys for the asymmetric algorithm. The key is only known tothe receiver and transmitter that helps in providing extra security to the data and information inthe network.2. The WPAN technologies are the advanced technologies that helps in providing smoothtransmission of data and information with proper security. The two examples of WPANtechnologies are Bluetooth and Zigbee. There are different types of challenges related to thesecurity of the data and information during the transmission. The attacks are against theconfidentiality and integrity of the data and information (Twitchell & Mai, 2014). Bluetooth isnot able to provide native client verification. The Bluetooth connection is not able to maintainthe explicit behavior of the connected devices. There is a huge risk of the DoS attacks in thenetwork. The transmission of data can be interrupted due to DoS attack in the network (Zhang etal., 2016). The malicious entry of the malwares and viruses in the network causes data breach inthe network. The sensitive data an information is in a major risk of being corrupted by themalicious viruses.Zigbee is a wireless communication that consumes low power for providing low ratecryptographic keys for security. The connection between two devices in the network initiates thedata transmission channel. There are various attacks in the Zigbee that causes huge data breachin the network.
Introduction to the Concept on Wireless Networking_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Networking Concept | Assignment
|7
|1457
|44

Wireless Networking Concept Name of the University Author's Note 1
|19
|1159
|117

Wireless Communication Standard
|10
|1400
|94

Assignment Wireless Networking (WSNs)
|9
|1464
|252

Wireless Networking Concepts Name of the Student Name of the University Author
|7
|1211
|425

Three Data Encryption Standards for WIMAX Networks Part 1: Wireless Networks
|14
|1565
|42