logo

Wireless Networking Concept Assignment

6 Pages1219 Words93 Views
   

Added on  2020-03-23

Wireless Networking Concept Assignment

   Added on 2020-03-23

ShareRelated Documents
Running head: WIRELESS NETWORKING CONCEPTWireless networking ConceptName of the StudentName of the UniversityAuthor’s Note
Wireless Networking Concept Assignment_1
1WIRELESS NETWORKING CONCEPT1. Worldwide Interoperability for Microwave Access (WiMax) refers to the movement ofsystems to long mile remote broadband access (Biagioni et al., 2016). It gives both point-to-pointand multipoint applications. WiMax uses three data encryption measures for guaranteeing thedata and information. WiMax uses Counter Mode with Cipher Block Chaining MessageAuthentication Code Protocol (CCMP) for encrypting progress on framework Bajracharya &Rawat, 2016). It uses Advanced Encryption Standard (AES) to transmit data securely. Triple DES Triple DES was proposed to implement principal Data Encryption Standard (DES)estimation hackers finally understands how to vanquish effectively. The individual keys used by Triple DES are of 56 bits each. The approximate key lengthis 168 bits; regardless, researchers would argue that 112-bits in key quality is similar to it. TripleDES still understands to influence a demonstrated data encryption to react in due request inregards to money related organization and particular attempts. AES The Advanced Encryption Standard (AES) is figuring trusted as standard by the U.S.Government and diverse affiliations. Eventually, it is an exceptional degree proficient in 128-piece plot. AES uses keys of 192 and 256 bits for huge duty encryption purposes (Weng et al.,2017). AES is observed as suitable to all attacks, beside savage power, that helps in maintainingmessages by using every considerable blend in the 128, 192, or 256-piece figure. In any case,security risks accept that AES will finally be hailed certified standard for encoding informationin private part. RSA
Wireless Networking Concept Assignment_2
2WIRELESS NETWORKING CONCEPTRSA is open key encryption estimation and standard for encrypting informationtransmitted over the internet. The key is open thing that is used to encrypt message, and privatekey to disentangle it.2. The two instances of WPAN headways are Bluetooth and Zigbee. There are diversesecurity challenges in the Bluetooth devices and development. There are diverse attacks againstprotection and information respectability (McCann & Montemurro, 2017). Bluetooth does notgive local client affirmation. The acquisition of the Bluetooth contraption is not done that causesexpress lead of other related devices. Bluejacking causes data breach from the Bluetooth enabled PDAs. The assailant starts thebluejacking by sending false message to the phones (Jelenkovic, Tosic & Seskar, 2016). Thesenavigate messages and phishing mail makes hurt the phones. Bluesnarfing is a hazard to this advancement that empowers the aggressors to fabricatethe use of the Bluetooth engaged devices. It looks for the IMEI number of the Bluetooth devices.ZigBee is a remote correspondence with low power and low-rate that hopes to givecryptographic keys to security. The association between the two devices is kept up by thesecurity convention of the ZigBee. There are distinctive physical strikes on the ZigBee radioconcerning the repeat break (Ponniah, Hu & Kumar, 2017).3. Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor networks: Acomprehensive review." Renewable and Sustainable Energy Reviews 55 (2016): 1041-1054.This paper deals with the gathering of consequences in the Wireless Sensor Network(WSN). WSN contain immense number of static sensor center points those associates in lowgetting ready. There are distinctive significant advantages for the WSNs including Radio
Wireless Networking Concept Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on Wireless Networking Concept
|6
|1263
|64

Wireless Networking Concept | Assignment
|7
|1457
|44

Wireless Networking Concepts Name of the Student Name of the University Author
|7
|1211
|425

Wireless Networking Concept Name of the University Author's Note 1
|19
|1159
|117

Wireless Networking Concept - Assignment
|6
|1484
|40

Introduction to the Concept on Wireless Networking
|7
|1309
|50