logo

The Wireless Networking Concepts | Assignment

   

Added on  2020-04-01

11 Pages2764 Words62 Views
Running head: WIRELESS NETWORKING CONCEPTSWireless Networking ConceptsName of the StudentName of the UniversityAuthor’s Note

1WIRELESS NETWORKING CONCEPTS Table of Contents1. Comparison of three data encryption standards for WiMAX network............................22. Security Challenges on WPAN technologies..................................................................33. Critical Reflection on Energy Harvest.............................................................................4References............................................................................................................................7

2WIRELESS NETWORKING CONCEPTS 1. Comparison of three data encryption standards for WiMAX network The protocol that can be used for the encryption and security of the network. This wouldresult in decreasing the frequency of unauthorized access of the points in the network (Rawal,2016). Different type of encryptions is used for the security of the network and different type ofencryption models and techniques are used for the network and also reduces the risk of externalintrusion within the system. The different type of risks that are involved with the networks areDDos and the Dos Attacks in the network. The DES was applied for the first time during the implementation of Lucifer which wascreated by IBM although the system had different type of down sides and it made use of veryprimitive type of encryption strategies and hence the instruction by the attackers became moreand more prominent. This system was vulnerable and could have been cracked very easily. Forthe expansion of security, the three DES has been used (Mahmood, Javaid & Razzaq, 2015).This 3DES is a symmetric key piece figure which utilizes the Data Encryption Algorithm threetimes for a specific square of information. The key size of figure of the Data EncryptionAlgorithm is 56 bit. In any case, expanding measure of computational power made the DESsecurity in danger. The key size of the 3DES is expanded to make the DES encryption standardmore secure to give assurance against every one of the information security assault by changingthe information into another piece of information. The different type of data encryption used inthe DES system are AES and Blowfish and these systems can be connected with the WiMAXsystem very easily. There are two types of key namely symmetric and asymmetric that can be useful for theencryption of the plaintext to the cipher content and the decryption of the cipher text to the plain

3WIRELESS NETWORKING CONCEPTS text (Kinnunen et al., 2016). (Movassaghi et al., 2014). The symmetric key encryption areutilized for the system as they can be implemented very easily and they have very simple processfor implantation. Two type of keys are generated in this encryption technique are private key andpublic key. Only the authenticated users would be able to access the content that is encryptedwith the private keys, but the contents that are encrypted with the public keys can very easily beciphered by all the other users in the network.2. Security Challenges on WPAN technologies The main security challenges for the WPAN technologies are that they might bevulnerable to several type of attacks if they are left unattended for a longer period of time (Lu etal., 2015). The various type of examples of the WPAN are Bluetooth and Zibee. The security testof Zigbee or Z-Wave is that the signs of the Zigbee or Z-wave are not straightforwardly perfectwith figuring gadgets of standard like tablet, portable PC and advanced mobile phone. The Hueknobs work in this procedure. Every one of the lights and globules of the house that aremechanized are associated with Zigbee center point which interfaces with Internet switch. Themovement sensors or the globules are expected to speak with center which is associated with theWi-Fi or the home system or by means of Ethernet link that is connected to the Internet switch.Zigbee or Z-wave is not perfect with each other which make a security challenge for thegadget .Zigbee and Z-wave are risen together so they are associated with the use of thetelephones or tablets (Liu et al., 2016). The Bluetooth hacking is known as Bluesnarfing. Thereason that lies behind Bluesnarfing is that the path in which Bluetooth is executed on telephonesand tablets. On account of Bluesnarfing, the procedure of question trade convention (OBEX) isactualized. Another procedure of Bluetooth hacking is the secondary passage hacking. Thissecondary passage hacking happens where the gadget is not trusted any longer and the cell phone

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment Wireless Networking (WSNs)
|9
|1464
|252

Assignment based on Wireless Networking Concept
|9
|1501
|85

Wireless Sensor Networks (WSN) Assignment
|10
|1524
|35

Wireless Networking Concepts (Doc) : Assignment
|9
|1506
|40

Wireless Technology Assignment
|19
|1711
|113

Wireless Communication Standard
|10
|1400
|94