Wireless Networking Concepts and Security

Verified

Added on  2020/03/23

|6
|1219
|93
AI Summary
This assignment delves into the fundamental concepts of wireless networking, focusing on technologies like WiMax, Bluetooth, and Zigbee. It analyzes different encryption methods such as AES, Triple DES, and RSA used to secure wireless communication. Furthermore, it examines security threats specific to Bluetooth and Zigbee networks, highlighting vulnerabilities and potential solutions.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: WIRELESS NETWORKING CONCEPT
Wireless networking Concept
Name of the Student
Name of the University
Author’s Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
WIRELESS NETWORKING CONCEPT
1. Worldwide Interoperability for Microwave Access (WiMax) refers to the movement of
systems to long mile remote broadband access (Biagioni et al., 2016). It gives both point-to-point
and multipoint applications. WiMax uses three data encryption measures for guaranteeing the
data and information. WiMax uses Counter Mode with Cipher Block Chaining Message
Authentication Code Protocol (CCMP) for encrypting progress on framework Bajracharya &
Rawat, 2016). It uses Advanced Encryption Standard (AES) to transmit data securely.
Triple DES
Triple DES was proposed to implement principal Data Encryption Standard (DES)
estimation hackers finally understands how to vanquish effectively.
The individual keys used by Triple DES are of 56 bits each. The approximate key length
is 168 bits; regardless, researchers would argue that 112-bits in key quality is similar to it. Triple
DES still understands to influence a demonstrated data encryption to react in due request in
regards to money related organization and particular attempts.
AES
The Advanced Encryption Standard (AES) is figuring trusted as standard by the U.S.
Government and diverse affiliations. Eventually, it is an exceptional degree proficient in 128-
piece plot. AES uses keys of 192 and 256 bits for huge duty encryption purposes (Weng et al.,
2017). AES is observed as suitable to all attacks, beside savage power, that helps in maintaining
messages by using every considerable blend in the 128, 192, or 256-piece figure. In any case,
security risks accept that AES will finally be hailed certified standard for encoding information
in private part.
RSA
Document Page
2
WIRELESS NETWORKING CONCEPT
RSA is open key encryption estimation and standard for encrypting information
transmitted over the internet. The key is open thing that is used to encrypt message, and private
key to disentangle it.
2. The two instances of WPAN headways are Bluetooth and Zigbee. There are diverse
security challenges in the Bluetooth devices and development. There are diverse attacks against
protection and information respectability (McCann & Montemurro, 2017). Bluetooth does not
give local client affirmation. The acquisition of the Bluetooth contraption is not done that causes
express lead of other related devices.
Bluejacking causes data breach from the Bluetooth enabled PDAs. The assailant starts the
bluejacking by sending false message to the phones (Jelenkovic, Tosic & Seskar, 2016). These
navigate messages and phishing mail makes hurt the phones.
Bluesnarfing is a hazard to this advancement that empowers the aggressors to fabricate
the use of the Bluetooth engaged devices. It looks for the IMEI number of the Bluetooth devices.
ZigBee is a remote correspondence with low power and low-rate that hopes to give
cryptographic keys to security. The association between the two devices is kept up by the
security convention of the ZigBee. There are distinctive physical strikes on the ZigBee radio
concerning the repeat break (Ponniah, Hu & Kumar, 2017).
3. Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor networks: A
comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016): 1041-1054.
This paper deals with the gathering of consequences in the Wireless Sensor Network
(WSN). WSN contain immense number of static sensor center points those associates in low
getting ready. There are distinctive significant advantages for the WSNs including Radio
Document Page
3
WIRELESS NETWORKING CONCEPT
Frequency-based imperativeness gathering, Solar-based essentialness gathering, Thermal-based
Energy Harvesting and Flow-based essentialness procuring. There are distinctive techniques
discussed in the paper for the essentialness gathering. As argued by Wolisz (2016), the
essentialness gathering structure may make hurt the ecological alter of the nature. The gathering
from different sources causes utilization of the benefits in the earth. Wolisz, (2016) argued that
log persisting contraptions eats up more battery and causes essentialness draining.
Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent
advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381.
This paper discusses the new advances executed in the energy harvesting division. As
commented by Fontes et al., (2017), the new advances in the energy harvesting gathering have
changed the standard circumstance of essentialness harvesting. Wolisz, (2016) argued that the
usage of the propelled methodologies in the imperativeness gathering have extends the hidden
cost of various essentialness sources and besides debilitating the natural resources. Diverse
conditions and hypotheses discussed in the paper that uses the traditional thought of essentialness
assembling and changing over it into current advancement (Ponniah, Hu & Kumar, 2017).

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
WIRELESS NETWORKING CONCEPT
References
Biagioni, E., Giordano, S., Luo, X., Camp, T., & Tian, T. (2016). Social and mobile solutions in
ad hoc and sensor networking [Series Editorial]. IEEE Communications Magazine, 54(7),
100-101.
Kusano, M., Figueira, E., Bird, R., & Van Hoof, N. (2017). U.S. Patent No. D794,019.
Washington, DC: U.S. Patent and Trademark Office.
McCann, S., & Montemurro, M. (2017). U.S. Patent No. 9,572,030. Washington, DC: U.S.
Patent and Trademark Office.
Ponniah, J., Hu, Y. C., & Kumar, P. R. (2017). A Clean Slate Approach to Secure Ad Hoc
Wireless Networking-Open Unsynchronized Networks. IEEE Transactions on Control of
Network Systems, 4(1), 37-48.
Bajracharya, C., & Rawat, D. B. (2016, January). Opportunistic spectrum access enabled
heterogeneous wireless networking for smart grid. In Consumer Communications &
Networking Conference (CCNC), 2016 13th IEEE Annual (pp. 793-797). IEEE.
Jelenkovic, F., Tosic, M., & Seskar, I. (2016, May). A semantic approach to wireless networking
testbed infrastructure. In Modeling and Optimization in Mobile, Ad Hoc, and Wireless
Networks (WiOpt), 2016 14th International Symposium on (pp. 1-8). IEEE.
Wolisz, A. (2016, November). Keynote-Intelligent Adaptive Management in Local Wireless
Networking. In Local Computer Networks (LCN), 2016 IEEE 41st Conference on (pp.
xxxiii-xxxiii). IEEE.
Document Page
5
WIRELESS NETWORKING CONCEPT
Weng, S., Zhai, D., Yang, X., & Hu, X. (2017, January). A ZigBee wireless networking for
remote sensing applications in hydrological monitoring system. In Seventh International
Conference on Electronics and Information Engineering (pp. 103221W-103221W).
International Society for Optics and Photonics.
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]