logo

Wireless Technology Assignment

   

Added on  2020-03-28

19 Pages1711 Words113 Views
Running head: WIRELESS TECHNOLOGIESWireless TechnologiesName of Student-Name of University-Author Note-

1WIRELESS TECHNOLOGIESAnswer to Question 1:Three data encryption standards that are used by WiMax networks are 3DES, AES andPKMv2. These standards of techniques help WiMax to keep security on its networks.3DES is the encryption standard that is officially known as Triple Data EncryptionAlgorithm (Zhang et al., 2014). This 3DES is a symmetric key block cipher which uses the DataEncryption Algorithm three times for a particular block of data. The key size of cipher of theData Encryption Algorithm is 56 bit. But increasing amount of computational power made theDES security at risk. The key size of the 3DES is increased to make the DES encryption standardmore secure to provide protection against all the data security attack by transforming the datainto a new block of data. The second standard of WiMax is the Advanced Encryption Standard (AES) which is ablock of cipher that is symmetric to give protection to the classified data and the AdvancedEncryption Standard is implemented in hardware and software so that the data that are sensitivewill be encrypted (Usman & Shami, 2013). National Institute of Standards and Technologymentioned that this algorithm must have a capability to handle 128 blocks of data with a key sizeof 128 bits, 192 bits and also 256 bits. The criteria that are followed by the AES Standard are:Security- The security of the data is to be looked after so that they are not hacked by hackers.Ciphers are to be added in the original text so that the changed data do not get hacked. Cost- Thecost of Advanced Encryption Standard is much less than other standards of algorithm thatprovides security to the data encryption process. Implementation- AES standard of dataencryption has an implementation process that provides sustainability to the algorithm.

2WIRELESS TECHNOLOGIESThe most important encryption standard that is followed by WiMax is the process ofPrivate Key Management version 2. The WiMax provides support to all the users. The keydistribution is secured in PKMv2 standard technique with the EAP (Extensible Authenticationprotocol). Handovers may create packet lose and delay of data which affects the communicationperformance of the real time (Hassan & Bach, 2014). So to mitigate this problem, new process ofkey caching PKMv2 is introduced to introduce the processing time and authentication cost of thedata encryption. The process helps to investigate the process and also stimulates the networkentry process by the implementation of MATLAB model with structured Query Languageattached to it. The network simulator carries the simulation. PVMv2 has three types of cachingtechniques that are used in key encryption.Answer to Question 2:The two examples of WPAN (Wireless Personal Area Network) Technology are Zigbeeor Z-Wave and Bluetooth (Al-Fuqaha et al., 2015). There are many more examples of WirelessPersonal Area Network such as Wi-Fi, INSTEON, Wireless USB, Body Area Network, IrDA.The security challenges of two examples of Wireless Personal Area Network that are explainedare Zigbee and Bluetooth. The security challenge of Zigbee or Z-Wave is that the signals of the Zigbee or Z-waveare not directly compatible with computing devices of mainstream like tablet, laptop and smartphone (Rault, Bouabdallah & Challal, 2014). The motion sensors or the bulbs are needed tocommunicate with hub which is connected to the Wi-Fi or the home network or via Ethernetcable that is plugged in the Internet router. The Hue bulbs work in this process. All the lights andbulbs of the house that are automated are connected to Zigbee hub which connects to Internet

3WIRELESS TECHNOLOGIESrouter. Zigbee and Z-wave are emerged together so that they are connected with the applicationof the phones or tablets. Zigbee or Z-wave is not compatible with each other which create asecurity challenge for the device.The second example of Wireless Personal Area Network is Bluetooth that faces securitychallenge in the sector. The Bluetooth hacking is known as Bluesnarfing. The reason that liesbehind Bluesnarfing is that the way in which Bluetooth is implemented on phones and tablets. Inthe case of Bluesnarfing, the process of object exchange protocol (OBEX) is implemented.Another process of Bluetooth hacking is the backdoor hacking (Tsampasis et al., 2016). Thisbackdoor hacking occurs where the device is not trusted anymore and the mobile phone isaccessed by hackers. This also gains access to the data with Bluesnarfing and uses services likeWireless Personal Area Network. Another process to hack Bluetooth is Bluebugging. Thisprocess helps to hack the mobile phones of the user. This attack is the most dangerous attackamong all the attack that persists in Bluetooth. The hackers get control on the user’s phone andare able to read or send messages from the victim’s phone, monitor the phone calls, make callsfrom the phone and are able to all the stuffs that Bluesnarfing cannot do. Answer to Question 3:Article: “Energy harvesting in wireless sensor networks: A comprehensive review” and“Energy harvesting wireless communications: A review of recent advances”.Energy Harvesting that is based on wireless sensor network is (EHWSN) the process ofextracting energy from the environment that it is surrounded by (Shaikh & Zeadally, 2106). Thedifferent sources of energy can be exploited by energy harvesting that includes wind,temperature, magnetic fields and solar power. The process of providing energy continuously and

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment based on Wireless Networking Concept
|9
|1501
|85

Wireless Networking Concepts (Doc) : Assignment
|9
|1506
|40

Network And security Assignment PDF
|23
|1376
|18

Network and Security Assignment PDF
|26
|2127
|51

Wireless Sensor Networks (WSN) Assignment
|10
|1524
|35

Assignment On Wireless Networking Concepts (Doc)
|9
|1534
|47