Wireless Networking Concepts and Security

Verified

Added on  2020/04/07

|19
|1159
|117
AI Summary
This assignment delves into the fundamental concepts of wireless networking, particularly emphasizing security protocols employed within WiMAX systems. It examines three prominent data encryption methods: Advanced Encryption Standard (AES), Triple DES, and RSA. The paper also discusses challenges related to security in Wireless Personal Area Networks (WPANs) such as Bluetooth and Zigbee, highlighting vulnerabilities like denial-of-service attacks and the depletion of resources due to energy harvesting practices. Finally, the assignment references research papers that shed light on advancements in wireless networking and energy harvesting technologies.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
0
WIRELESS NETWORKING CONCEPT
Wireless networking Concept
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
WIRELESS NETWORKING CONCEPT
1. The use of the advance technology in the market have helped in maintaining the security
of the data and information. Worldwide Interoperability for Microwave Access (WiMax) focuses
on services provided over a long distance by remote broadband access (Bernardos et al., 2014).
The applications of the WiMax have helped in keeping up the security of the information and
data over the system. The WiMax has a safe security convention having three data encryption
system. The three-information encryption strategy has been discussed below:
AES
The Advanced Encryption Standard (AES) is an algorithm that has been endorsed by the
US government. It takes a shot at a degree capable in 128-piece outline. It utilizes 192 and 256
bits keys for encryption process. The reason for the AES is to give a hi-tech level of security to
the information and data in the WiMax (Wu, Wang & Youn, 2014). The use of the AES have
held in keeping up the genuine standard of encoding information and data in the private division.
Triple DES
A triple DES give unique Data Encryption Standard (DES) algorithm that limits the
hackers from breaching the information and data in the system. The triple DES is a critical
standard that aides in using the symmetric calculation in different business association. The
encryption standard uses 56 bits each keys (Cheng, Huang & Du, 2013). The general length of
the key is 168 bits. Nevertheless, different master recommend 112-piece key is more like it.
RSA
RSA is an algorithm that uses asymmetric key encryption over internet. The RSA
calculation helps in encrypting and decrypting messages in the system. The plain content is
changed over into cipher message that is in encoded shape.
Document Page
2
WIRELESS NETWORKING CONCEPT
On the other hand, RSA utilizes two keys for the uneven calculation. The key is just
known to the collector and transmitter that aides in giving additional security to the information
and data in the system.
2. The WPAN technologies are innovative technologies that aides in giving smooth
transmission of information and data with legitimate security. The two cases of WPAN advances
are Bluetooth and Zigbee. There are diverse sorts of difficulties identified with security of the
information and data amid the transmission. The assaults are against the secrecy and honesty of
the information and data (Makris, Skoutas & Skianis, 2013). Bluetooth is not able to give local
customer check. The Bluetooth connection is not ready to keep up the express conduct of the
associated gadgets. There is a tremendous danger of the DoS assaults in the system. The
transmission of information can be hindered because of DoS assault in the system (Amadeo et
al., 2014). The malignant section of the malwares and infections in the system causes
information break in the system. The sensitive information is in a danger of being defiled by the
malicious viruses.
Zigbee is a remote communication device that devours low power for giving low rate
cryptographic keys to security. The association between two gadgets in the system starts the
information transmission channel. There are different assaults in the Zigbee that causes
tremendous information rupture in the system.
3. Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor
networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016):
1041-1054.
Document Page
3
WIRELESS NETWORKING CONCEPT
This paper manages the social consequences of advances in the Wireless Sensor Network
(WSN). WSN incorporate monstrous number of static sensor focus focuses those aides in low
preparing. There are different wellsprings of centrality for the WSNs including Radio
Frequency-based significance gathering, Solar-based noteworthiness gathering, Thermal-based
Energy Harvesting and Flow-based vitality securing. There are different methodologies talked
about in the paper for the data gathering in progresses. As argued by Haas, (2013), this
framework may makes harm the environmental nature.
Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent
advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381.
This paper talks about the new advances executed in the vitality gathering division. As
remarked by Wang, Zhang & Gulliver, (2014), the new advances in the criticalness gathering
have changed the standard situation of vitality acquiring. Haas, (2013) argued that the utilization
of the pushed methods in the vitality gathering have develops the shrouded cost of different
criticalness sources what's more exhausting the steady assets. Different conditions and
speculations talked about in the paper that uses the consistent idea of vitality amassing and
changing over it into current improvement.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
WIRELESS NETWORKING CONCEPT
4. Power point slides.
Document Page
5
WIRELESS NETWORKING CONCEPT
Document Page
6
WIRELESS NETWORKING CONCEPT
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
WIRELESS NETWORKING CONCEPT
Document Page
8
WIRELESS NETWORKING CONCEPT
Document Page
9
WIRELESS NETWORKING CONCEPT
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
WIRELESS NETWORKING CONCEPT
Document Page
11
WIRELESS NETWORKING CONCEPT
Document Page
12
WIRELESS NETWORKING CONCEPT
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
WIRELESS NETWORKING CONCEPT
Document Page
14
WIRELESS NETWORKING CONCEPT
Document Page
15
WIRELESS NETWORKING CONCEPT
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
WIRELESS NETWORKING CONCEPT
Document Page
17
WIRELESS NETWORKING CONCEPT
Document Page
18
WIRELESS NETWORKING CONCEPT
References
Amadeo, M., Campolo, C., Molinaro, A., & Ruggeri, G. (2014). Content-centric wireless
networking: A survey. Computer Networks, 72, 1-13.
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zúñiga, J.
C. (2014). An architecture for software defined wireless networking. IEEE wireless
communications, 21(3), 52-61.
Cheng, X., Huang, X., & Du, D. Z. (Eds.). (2013). Ad hoc wireless networking(Vol. 14).
Springer Science & Business Media.
Haas, H. (2013). High-speed wireless networking using visible light. SPIE Newsroom, 1, 1-3.
Makris, P., Skoutas, D. N., & Skianis, C. (2013). A survey on context-aware mobile and wireless
networking: On networking and computing environments' integration. IEEE
communications surveys & tutorials, 15(1), 362-386.
Wang, N., Zhang, N., & Gulliver, T. A. (2014). Cooperative key agreement for wireless
networking: Key rates and practical protocol design. IEEE Transactions on Information
Forensics and Security, 9(2), 272-284.
Wu, S., Wang, H., & Youn, C. H. (2014). Visible light communications for 5G wireless
networking systems: from fixed to mobile communications. Ieee Network, 28(6), 41-45.
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]