logo

WiMAX Networks Security Report

   

Added on  2020-04-07

3 Pages1235 Words48 Views
Task 1The WiMAX network has its security measures highlighted by the IEEE 802.16 standards. It ensuresencryption and authentication for the WiMAX security. The security model uses a number of advancedtechniques based over the air encryption[ CITATION Rad \l 1033 ]. The researchers seek to develop the endto end security in the system by adopting better security techniques within the overall network design androll out as well as in the ways of working. There are three key encryption standards commonly used in theWiMAX technology namely,(i)Data encryption standards (DES)(ii)Privacy key management protocol Version 2 (PKMv2), Extensible Authentication protocol(EAP)(iii)EAS- the advanced encryption standard The PKMv2 has a key management protocol for the encrypted and authorized exchange of crypto keysfor broadcast and multicast traffic. The internet engineering task force proposed another protocol fordevice and user authentication known as the extensible authentication protocol. The EAS protects trafficas it is being transmitted. Authentication gives the network an ability of the network to ensure that theusers and their devices are accessing services legitimately. The EAP provides a flexible and scalableplatform for the authentication of both the users and their personal devices. The AES is preferred to all the other encryption standards as it ensures protection of traffic over the air. Ituses the cipher block chaining message and the authentication code. It introduces the use of trafficencryption state machine which uses a periodic key refresh mechanism to provide for the continuedtransition of keys. Both AES and DES are block cipher encryption techniques. The AES is a replacementof the DES. The AES is faster, more flexible, and reliable as compared to the DES and Blowfish. TheDES uses an encryption of 64-bits with a key length of 56 bits while the AES has a variable key length of128, 192, 256 bits. The default key length used is the 256 bits in the AES[ CITATION Kri08 \l 1033 ]. DES56-bit key16-cycle of each 48-bit sub keys in permutating the 56-bit key.Block size of 64-bits made from L and R blocks of 32-bits each.AES128-,192-,256-bit keySymmetrical block ciphers for the 128-bit data blocks10,12,14-round effective on an attack against the algorithm. Blowfish64-bit block cipher32-bit to 448-bit variable length keysFree, unpatented, unlicensed encryption standard.The AES standards is the most preferred technique or standards owing to,(i)Robust and very secure(ii)Software and hardware performance(iii)Suitability in restricted space environments(iv)Resistance to the analysis of power and other implementation attacksTask 21

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment based on Wireless Networking Concept
|9
|1501
|85

Wireless Technology Assignment
|19
|1711
|113

Wireless Communication Standard
|10
|1400
|94

Wireless Networking Concepts (Doc) : Assignment
|9
|1506
|40

Wireless Sensor Networks (WSN) Assignment
|10
|1524
|35

Wireless Communication Assessment
|11
|2031
|36