logo

Wpan technology Assignment

6 Pages928 Words23 Views
   

Added on  2019-11-08

Wpan technology Assignment

   Added on 2019-11-08

ShareRelated Documents
REPORT
Wpan technology Assignment_1
ContentsThree data encryption standards for WiMAX networks..................................................................2Security challenges for any two examples of WPAN technologies................................................3Read the following two research papers and comment...................................................................3References........................................................................................................................................5
Wpan technology Assignment_2
Three data encryption standards for WiMAX networksa.Counter Mode with Cipher Block Chaining Message Authentication Code ProtocolThis is for the encryption of all the traffic on the network. This takes hold of the encapsulated mechanism which is for the confidentiality of the data. It is mainly to create and address the vulnerabilities which are presented by WEP (Taheri et al., 2017). The forms are set with the CCMP Medium Access Control Protocol to define the sections and the control through the incremented sets of the data packet. It also includes the reserving of the data confidentiality, authentication and the access control. It is mainly in conjunction with the layer management. Theformats and the standards are for the theoretical strength of the key which is 2^n. b.Advanced Encryption Standard (AES)For the proper management and easy transmission of the data in a secured manner. It makes use of the Wi-Fi and has a stronger encryption key management (Gautam et al., 2016). The advancement is based on handling the information technology with the blocking of the ciphers. This works on handling the different encryption packages with the access cipher that allows the secret information to be used in the NSA format to be approved with the cryptographic module. The algorithm can handle the evaluation based on the system standards. c.PKM-EAP (Extensible Authentication Protocol)This includes the functioning which has end-to-end authentication. This includes the entity where the mechanism is made to ensure about the valid users who can access to the WiMAX network. With this, there is a use of the service providers where the access control is based on the dial up modems (Alamifar et al. 2016).
Wpan technology Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Networking Concept | Assignment
|7
|1457
|44

Security Challenges of WPAN Technologies
|7
|1282
|84

WiMAX Networks Security Report
|3
|1235
|48

Assignment Wireless Networking (WSNs)
|9
|1464
|252

Wireless Communication Assessment
|11
|2031
|36

Security Challenges of Two Examples of WPAN Technologies
|10
|2284
|172