logo

Wireless network Concepts Assignment

11 Pages2890 Words43 Views
   

Added on  2021-06-18

Wireless network Concepts Assignment

   Added on 2021-06-18

ShareRelated Documents
Running head: WIRELESS NETWORKING CONCEPTSWireless Networking ConceptsName of the Student:Name of the University:
Wireless network Concepts Assignment_1
1WIRELESS NETWORKING CONCEPTSTable of Contents1.Compare and contrast three data encryption standards for WiMAX networks..................22.Coordination of traffic in shared wireless medium and additional methods reduce thecollisions in shared wireless medium.........................................................................................33.Two research papers on Internet of Things........................................................................5References..................................................................................................................................9
Wireless network Concepts Assignment_2
2WIRELESS NETWORKING CONCEPTS1.Compare and contrast three data encryption standards for WiMAXnetworksThe main purpose of this question is to highlight of the comparison and contrast of threetypes of data encryption standards which are in the WiMAX. WiMAX is evolved wirelesstechnology which is based on the IEEE 802.16 standard. The security sub-layer of theWIMAX network is consisted of authentication, authorization as well as encryption whichare taken place (Cao, Cheung, & Yuk, 2015). When the data are being transmitted as well asreceived over the WiMAX wireless infrastructure, then three types of encryption standardsare being used which are used for the WiMAX networks are as follows:Advanced encryption standards (AES) with 128 bit keyRivest, Shamir and Adleman (RSA) with 1024 bit keyTriple Digital Encryption Standard (3-DES)Both AES as well as 3-DES are the symmetric encryption algorithms which are usedof block cipher methods while RSA is asymmetrical algorithm. The difference betweensymmetric as well as asymmetric encryption algorithms are that the symmetric encryptionconsists of keys which have similar encryption as well as decryption and unlike asymmetricencryption which is used of two different keys (Bakariya et al., 2015). 3-DES encrypts ofdata three times with a 56-bit key. It is not secured as AES such that AES is meant as well asdesigned for replacement of 3-DES. RSA is asymmetrical algorithm used as public as well asprivate key, such a key which is used to encrypt of traffic as well as other key used fordecryption (Huang et al., 2015). RSA is used for the purpose of authentication and consists ofkey length of 2048 of which 1028 is considered as the average size. RSA is required of CPUoverhead for generation as well as maintenance compared to the symmetrical algorithms like
Wireless network Concepts Assignment_3
3WIRELESS NETWORKING CONCEPTSones mention (Jia & Deng, 2017). Three of the encryption standards are provided withconfidentiality by turning of clear text into the cipher text. Into all the three encryption standards, the encryption as well as decryption techniquesare faster into AES while it is slower in case of RSA. In case of AES as well as DES, there islower power consumption while it is higher in case of RSA. AES as well as DES areconsisted of various Deciphering and Ciphering algorithm while RSA does Deciphering andCiphering with use of same algorithm (Benveniste 2016). The time for encryption along withdecryption are varied in case of the three encryption techniques for exact size of packet.Based on the comparison of three of the encryption techniques, it is concluded thatdecryption of the AES algorithm is better as compared to other decryption techniques for twoof the algorithms such as DES as well as RSA (Thilina et al., 2015). After the contrastbetween AES, RAS as well as DES, it is analyzed that exchange of data with use of RSA, it isrequired to use of public key for the purpose of encryption while it is decrypted with use ofthe private keys only. The entire process of encryption is time consuming while AESalgorithm it is used with use of the same key but there are huge chances of theft of theconfidential data (Jabbar, Dell'Anno, & Pearlman, 2017). Apart from all this, DES algorithmis required of time for the purpose of encryption which is dependent on the key length. It ismade the entire process faster as well as slower in use. DES is a longer key length which isprovided of defence against the force attack along with crack able. 2.Coordination of traffic in shared wireless medium and additionalmethods reduce the collisions in shared wireless mediumThe traffic of the shared wireless medium is done with coordination based on themedium access control (MAC) protocol. It is also coordinated based on the spectrumefficiency in addition to types of wireless ad hoc network. The medium access control
Wireless network Concepts Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Networking Concepts Assignment PDF
|8
|1687
|19

Wireless Networking | Assignment
|9
|1836
|43

Assignment On Wireless Networking Concepts (Doc)
|9
|1534
|47

Network And security Assignment PDF
|23
|1376
|18

Question 1: Data Encryption Standards for WiMAX
|6
|1264
|236

Network and Security Assignment PDF
|26
|2127
|51