Wireless Network and Security

Verified

Added on  2023/04/21

|8
|2471
|97
AI Summary
This report discusses the evaluation of wireless networks and Internet of Things (IoT) in terms of communication technologies, network performance, security and privacy issues, and proposal of communication technology for IoT enabled devices in home network. It compares existing communication technologies for IoT, evaluates network performance and impact of wireless technologies, identifies security and privacy issues in IoT, and proposes Z wave as a communication technology for IoT enabled devices in home network.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: WIRELESS NETWORK AND SECURITY
Wireless Network and Security
Name of the Student
Name of the University
Author’s Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
WIRELESS NETWORK AND SECURITY
Table of Contents
Introduction...........................................................................................................................................2
Discussion..............................................................................................................................................2
1. Comparison of Existing Communication Technologies for IoT by Emphasizing on the Use of
Sensor Network and Wireless Technologies......................................................................................2
2. Evaluation of Network Performance of Communication Technologies for IoT and Impact of
Wireless Technologies on the Performance......................................................................................4
3. Identification and Analysis of Security and Privacy Issues in IoT for Wireless System...................4
4. Proposal of Communication Technology for IoT Enabled Devices in Home Network....................5
Conclusion.............................................................................................................................................5
References.............................................................................................................................................7
Document Page
2
WIRELESS NETWORK AND SECURITY
Introduction
IoT or Internet of Things can be stated as the subsequent system of interlinked computing
devices, objects, people as well as digitalized machines, which are provided with UIDs or unique
identifiers as well as the core capability of transferring data on the network with even needing
human to computer and human to human interactions [5]. This technology involves extension of
internet connectivity even beyond the standardized devices like tablets, smart phones, laptops and
desktops for proper communication or interaction over the network for remotely monitoring and
controlling. The following report outlines a brief description on the evaluation of IoT networks.
Proper comparison of existing communication technologies for Internet of Things by simply
emphasizing on the overall utilization of wireless technologies and sensor network with proper
evaluation would be provided here. Moreover, a communication technology would also be proposed
for IoT devices in home network.
Discussion
1. Comparison of Existing Communication Technologies for IoT by Emphasizing on the Use of
Sensor Network and Wireless Technologies
The IoT or Internet of Things has eventually emerged as one of the most prominent and
promising areas of the communication [12]. Since this communication technology anticipates
interconnection of several devices, Internet of Things is seen as the integral part of several
applications like smart grids, intelligent transportation service, smart cities and several others. There
are several some of the major and the most important protocols or communication technologies of
Internet of Things are Bluetooth, Zigbee, Z Wave, 6 LowPAN, Thread, WiFi, Cellular, NFC, Sigfox and
many more. A proper comparison of these existing communication technologies for IoT is given
below:
Key
Factors
Bluetooth Zigbee Z Wave 6
LowPAN
WiFi Cellular NFC
a) Band
of
Operati
on
The band
of
operation
of
Bluetooth
is
between
the
The band
of
operation
of Zigbee
protocol is
between
the
frequencies
The band
of
operation
of Z wave
is 908.42
MHz [1].
6 LowPAN
communi
cation
technolog
y
operates
at the
band of
There are
several
bands of
operation
for WiFi,
which are
900 MHz,
2.4 GHz,
There are
four
bands of
operation
for
cellular,
which are
850 MHz,
NFC
generall
y
operate
s at the
frequen
cy band
of
Document Page
3
WIRELESS NETWORK AND SECURITY
frequenci
es of
2402 MHz
and 2480
MHz.
of 2.4 GHz
to 2.4835
GHz.
2.4 GHz. 3.6 GHz,
4.9 GHz, 5
GHz, 5.9
GHz and 60
GHz.
900 MHz,
1800 MHz
and 1900
MHz.
13.56
MHz
[7].
b)
Modula
tion
Techniq
ues
Bluetooth
uses
8DPSK or
Differenti
al
Quadratu
re Phase
Shift
Keying
[3].
The
modulation
techniques
for Zigbee
protocol
are BPSK or
binary
phase shift
keying and
OQPSK or
offset
quadrature
phase shift
keying.
The
modulatio
n
technique
for Z
wave is
Binary
Phase
Shift
Keying or
BPSK.
The
modulati
on
technique
s for Z
wave are
binary or
amplitude
shift
keying.
The
modulation
techniques
for WiFi
technology
are CCK or
compleme
ntary
coded
keying and
QPSK or
quadrature
phase shift
keying [8].
The
modulati
on
technique
for
cellular
technolog
y is binary
phase key
shifting or
BPSK.
The
modula
tion
techniq
ue for
NFC is
signal
coding
and
modula
tion.
c) Data
Rates
The data
rate of
Bluetooth
technolog
y is 1
Mbps.
The data
rate of
Zigbee
protocol is
250 kbps
[10].
The data
rates of Z
wave
technolog
y are 9.6,
40, 100
kbits/ sec.
The data
rate of 6
LowPAN
technolog
y is NA.
The data
rate of WiFi
communica
tion
technology
is 600
Mbps
maximum.
The data
rate of
cellular
technolog
y is 35 to
160 kbps
for GPRS
[4].
The
data
rate of
NFC
technol
ogy is
100 to
420
kbps.
d)
Nomina
l Range
of
Operati
on
The data
transfer
rate for
Bluetooth
technolog
y is 50 to
The data
transfer
rate for
Zigbee
protocol is
10 to 100
The data
transfer
rate for Z
wave is
around 30
m.
The range
of data
transfer
in this
technolog
y is NA.
The range
of data
transfer in
WiFi is
approximat
ely 50m
The range
of data
transfer
in this
communi
cation
The
range
of data
transfer
in this
technol

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
WIRELESS NETWORK AND SECURITY
150 m. m [9]. [11]. technolog
y is
maximum
of 35 km
for GSM.
ogy is
10 cm.
2. Evaluation of Network Performance of Communication Technologies for IoT and Impact of
Wireless Technologies on the Performance
The above mentioned communication technologies for Internet of Things comprise of a
better performance of network and should be evaluated on time. The several types of IoT sensors as
well as modes of communications are considered here [2]. It is majorly expected for being important
for the customer’s products and for the connection of smart devices in today’s world. Network
performance eventually refers to the subsequent measures of network service quality. Various
different methodologies are present for the purpose of measuring the network performance, since
each and every network is different from one another in terms of design and nature [6]. Some of the
major and the most significant performance measures are being considered for IoT based
communication technologies.
These performance measures are bandwidth, throughput, latency, jitter and finally error
rate. The above mentioned communication technologies are extremely effective and efficient and all
of them could provide efficiency to the technology of Internet of things [3]. The five performance
measures make Bluetooth, Z Wave, Zigbee and WiFi much better than the other technologies since
the bandwidth and error rates are better in these communication technologies. There is a major
impact of the wireless technologies on the network performance. The most significant effect of the
wireless communication is the core ability of reaching to the users effectively and easily so that user
tracking is not an issue any more. This even assures to provide accurate results in terms of the
network performance [12]. Hence, the wireless technologies comprise of a stronger impact on the
network performance.
3. Identification and Analysis of Security and Privacy Issues in IoT for Wireless System
In spite of having some of the major and the most significant advantages, there are issues
present as well in the Internet of Things in respect to privacy and security and these issues are
required to be eradicated under every circumstance [1]. These privacy and security issues of IoT are
as follows:
Document Page
5
WIRELESS NETWORK AND SECURITY
i) Insufficient Testing and Updating: The first and the most significant security issue of IoT is
the insufficient testing and updating. As there is lack of testing and updating, it often becomes a
major issue for the user to identify the problem and obtain more advantages [4]. Moreover, there is
also a higher chance of data loss in this type of technology.
ii) Brute Forcing as well as Issue of Default Passwords: Another important and noteworthy
security issue in this technology is brute forcing and the core problem of default passwords. Due to
such passwords, DDoS attacks are extremely common and it becomes quite difficult to manage such
situations subsequently.
iii) IoT Ransomware and Malware: The next popular and important security issue in IoT is
the ransomware and malware [12]. Since, the number of IoT connected devices has risen,
exploitation with the help of such malware is also possible.
iv) IoT Botnets: These types of botnets eventually aim at the crypto currency and hence it
becomes extremely difficult for the user to manage it.
v) Data Security: The next subsequent privacy and security issue is related to data security. It
is the one of the largest issues in today’s technological world [8]. Data is continuously being
harnessed, processed, stored and even transmitted and thus it becomes a major security issue for
the user.
4. Proposal of Communication Technology for IoT Enabled Devices in Home Network
The proposal of communication technology for IoT enabled device in home network is Z
wave [7]. It is a lower power RF communication technology, which has been mainly designed for the
home automation for products like lamp controllers as well as sensors amongst several others. It is
optimized for low latency and reliable communication of small data packers. Although, the range is
shorter, it is quite effective for the IoT enabled devices in a home network. The communication,
networking and connectivity protocols utilized with these web enabled devices majorly are
dependent on the specified deployed IoT applications [5]. This particular technology is the network
of devices like vehicles as well as home appliances, which comprise of software, connectivity,
electronics and actuators that allow the things in connecting, interacting and exchanging data.
Conclusion
Therefore, from the above discussion, it can be concluded that Internet of Things comprises
of web enabled smart devices, which utilize the embedded sensors, communication hardware and
processors for collecting, sending and acting on the data they obtain from environments. These
devices of internet of things eventually share sensor data, which are being collected by proper
Document Page
6
WIRELESS NETWORK AND SECURITY
connection to any IoT gateway and any other edge device, in which data is being sent to cloud.
These data are required to be analysed properly. All of these devices then communicate with the
other linked devices by acting on the information that is being obtained. The most significant
advantages of this Internet of Things are monitoring overall business procedures, improving
customer experiences, saving time and money, enhancement of employee productivity, integration
or adaptation of business models, making business decisions better, generation of more revenue and
many more. The above report has clearly outlined the evaluation of wireless networks and Internet
of Things with relevant details.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
WIRELESS NETWORK AND SECURITY
References
[1] Samaila, M.G., Neto, M., Fernandes, D.A., Freire, M.M. and Inácio, P.R. Challenges of securing
Internet of Things devices: A survey. Security and Privacy, 1(2), p.e20. 2018.
[2] Lin, S., Miao, F., Zhang, J., Zhou, G., Gu, L., He, T., Stankovic, J.A., Son, S. and Pappas, G.J. ATPC:
adaptive transmission power control for wireless sensor networks. ACM Transactions on Sensor
Networks (TOSN), 12(1), p.6. 2016.
[3] Pantazis, N.A., Nikolidakis, S.A. and Vergados, D.D. Energy-efficient routing protocols in wireless
sensor networks: A survey. IEEE Communications surveys & tutorials, 15(2), pp.551-591. 2013.
[4] Rault, T., Bouabdallah, A. and Challal, Y. Energy efficiency in wireless sensor networks: A top-
down survey. Computer Networks, 67, pp.104-122. 2014.
[5] Rawat, P., Singh, K.D., Chaouchi, H. and Bonnin, J.M. 2014. Wireless sensor networks: a survey on
recent developments and potential synergies. The Journal of supercomputing, 68(1), pp.1-48. 2014.
[6] Xie, S. and Wang, Y. Construction of tree network with limited delivery latency in homogeneous
wireless sensor networks. Wireless personal communications, 78(1), pp.231-246. 2014.
[7] Huang, P., Xiao, L., Soltani, S., Mutka, M.W. and Xi, N. The evolution of MAC protocols in wireless
sensor networks: A survey. IEEE communications surveys & tutorials, 15(1), pp.101-120. 2013
[8] Branch, J.W., Giannella, C., Szymanski, B., Wolff, R. and Kargupta, H. In-network outlier detection
in wireless sensor networks. Knowledge and information systems, 34(1), pp.23-54. 2013.
[9] Guo, S., He, L., Gu, Y., Jiang, B. and He, T. 2014. Opportunistic flooding in low-duty-cycle wireless
sensor networks with unreliable links. IEEE Transactions on Computers, 63(11), pp.2787-2802. 2014.
[10] Butun, I., Morgera, S.D. and Sankar, R. A survey of intrusion detection systems in wireless sensor
networks. IEEE communications surveys & tutorials, 16(1), pp.266-282. 2014.
[11] Zhang, D., Li, G., Zheng, K., Ming, X. and Pan, Z.H. An energy-balanced routing method based on
forward-aware factor for wireless sensor networks. IEEE transactions on industrial informatics, 10(1),
pp.766-773. 2014.
[12] Tyagi, S. and Kumar, N. A systematic review on clustering and routing techniques based upon
LEACH protocol for wireless sensor networks. Journal of Network and Computer Applications, 36(2),
pp.623-645. 2013.
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]