logo

Wireless Networking Concept | Assignment

7 Pages1457 Words44 Views
   

Added on  2020-04-01

Wireless Networking Concept | Assignment

   Added on 2020-04-01

ShareRelated Documents
Running head: WIRELESS NETWORKING CONCEPTWireless networking ConceptName of the StudentName of the UniversityAuthor’s Note
Wireless Networking Concept | Assignment_1
1WIRELESS NETWORKING CONCEPT1. Worldwide Interoperability for Microwave Access (WiMax) refers to the delivery ofservices to long mile wireless broadband access (Bernardos et al., 2014). It provides bothmultipoint and applications. It has able to improve the network security during transmission tolast mile. WiMax uses three data encryption standards for protecting the data and information.WiMax uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol(CCMP) to encrypt all traffic on its network (Makris, Skoutas & Skianis, 2013). The dataencryption standards used by WiMax is described as below:Triple DESTriple DES used to implement original Data Encryption Standard (DES) algorithm,hackers used for figuring out how to vanquish effortlessly. Triple DES was important standardand most used symmetric algorithm in organization (Osseiran et al., 2014). Triple DES uses three different keys that are 56 bits each. The key length is 168 bits;researchers would suggest that 112-bits in key quality is more similar to it. AESThe Advanced Encryption Standard (AES) is algorithm trusted as standard by the U.S.Government. It is used in 128-piece frame. AES uses keys of 192 and 256 bits for encryptionpurposes (Sahingoz, 2014). It is used in many cases in the organization for providing security tothe data and security of the business organization.RSARSA is a key encryption algorithm and standard for encrypting transmitted on Internet.RSA is used as an asymmetric algorithm because of its uses of a couple of keys (Viani et al.,
Wireless Networking Concept | Assignment_2
2WIRELESS NETWORKING CONCEPT2013). The key is an algorithm that is use to encrypt message. There is a private key to decode it.The limitation of RSA encryption is a data that takes aggressors a lot of time.2. The two examples of WPAN technologies are Bluetooth and Zigbee. There are varioussecurity challenges in the Bluetooth devices and technology. There are various attacks againstconfidentiality and data integrity (Ayyash et al., 2016). Bluetooth does not provide native clientverification. The authorization of the Bluetooth device is not done that causes explicit behaviorof other connected devices. There is a huge threat of DoS attacks on the Bluetooth devicesduring transmission of data and information. There can be malicious entry of external partiesduring the transmission process of data and information. The sensitive data and informationmight be damaged and corrupted during the wireless transmission. Bluesnarfing is a threat to this technology that allows the attackers to increase the use ofthe Bluetooth enabled devices. It looks for the IMEI number of the Bluetooth devices and getconnected through this. After connecting with the parent Bluetooth devices, the connected devicebreaches all the data and information from the Bluetooth device.Bluejacking causes data breach from the Bluetooth enabled mobile phones. The attackerstarts the bluejacking by sending false message to the mobile phones (Jiang et al., 2017). Thesespan messages and phishing mail causes damage to the mobile phones. ZigBee is a wireless communication with low power and low-rate that aims to providecryptographic keys for security. The link between the two devices is maintained by the securityorotocol of the ZigBee. There are various physical attacks on the ZigBee radio regarding thefrequency breach (Osseiran et al., 2014). The data packets collected during the wirelesscommunication ca be breached.
Wireless Networking Concept | Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Introduction to the Concept on Wireless Networking
|7
|1309
|50

Wireless Networking Concept Assignment
|6
|1219
|93

Report on Wireless Networking Concept
|6
|1263
|64

Three Data Encryption Standards for WIMAX Networks Part 1: Wireless Networks
|14
|1565
|42

Wireless Networking Concept Name of the University Author's Note 1
|19
|1159
|117

Wireless Communication Standard
|10
|1400
|94