logo

Mobile WiMAX Security Analysis

   

Added on  2020-02-23

9 Pages2120 Words112 Views
 | 
 | 
 | 
Running head: WiMAX NETWORKSWiMAX NETWORKSName of the StudentName of the UniversityAuthor note
Mobile WiMAX Security Analysis_1

WiMAX NETWORKS1Table of Contents1.Comparison of data encryption standards for WiMAX....................................................22.Security challenges faced by WAPN technology:............................................................3Security challenges faced by Bluetooth technology are listed below:................................3Security challenges faced by ZigBee technology:...............................................................43.Paper Review: Energy Harvesting....................................................................................5References:..........................................................................................................................7
Mobile WiMAX Security Analysis_2

WiMAX NETWORKS21.Comparison of data encryption standards for WiMAXWiMAX or Worldwide Interoperability for Microwave Access is a coalition of thewireless industry for the advancement of IEEE 802.16 standards for broadband wireless access(BWA) networks. WiMAX(Pareit et al., 2012) is commonly known as 4G network and is awireless wide area network (WAN) that can cover the area same as DSL lines but without wires.3DES (Data Encryption Standard)(Singh, 2013) and AES (Advanced encryption standard)(Ahmad & Ismail, 2016) is used by WiMAX to encrypt the data transferred on the network. The3DES uses three different keys to encrypt the data. Each data is of the length of 56-bits each. Insome software’s the performance becomes slow due to the use of this three keys. The 3DES isbecoming obsolete due to its slow performance and the limit of length of the keys. AdvancedEncryption Standard(Rewagad & Pawar, 2013) is the main tool used for encryption in WiMAXtechnology. Encryption key of 128-bit, 192-bit and 256-bit is supported by the advancedencryption standard. AES is a popular algorithm which was built from CCMP. 3DES is muchslower than AES. Advanced Encryption standard is much more easy to implement and a verylittle memory is used. However, AES does not require dedicated processors on board the BS, andm their might be a risk of not being used by all end-user terminals. Initially this helps inconsidering the fact that 3DES still remains a vital encryption tool on the WiMAX (Dadhich,Narang & Yadav 2012) network in spite of the presence of advanced encryption standard.
Mobile WiMAX Security Analysis_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mobile WiMAX Security Analysis
|9
|2098
|58

Energy Harvesting in Wireless Communication
|14
|1447
|252

Telestra Field Service System and Cellular Handsets
|10
|1400
|94

Wireless Networking Concepts and Security
|7
|1211
|425

Energy Harvesting for Wireless Sensor Networks
|11
|2031
|36

Wireless Communication and Cellular Handsets
|9
|1464
|252