logo

Security Challenges of WPAN Technologies

   

Added on  2020-04-07

7 Pages1282 Words84 Views
Running head: WIRELESS NETWORKSWireless NetworksName of the StudentName of the UniversityAuthor’s note
Security Challenges of WPAN Technologies_1
1WIRELESS NETWORKSTable of ContentsPart 1: Three Data Encryption Standards for WIMAX Networks.......................................2Part 2: Security Challenges of WPAN Technologies..........................................................2Part 3: Critical Reflection on Energy Harvest.....................................................................3References............................................................................................................................5
Security Challenges of WPAN Technologies_2
2WIRELESS NETWORKSPart 1: Three Data Encryption Standards for WIMAX NetworksAES: AES or Advanced Encryption Standard is considered to be a block cipher that issymmetric in nature. The government of U.S has chosen this for the protection of classifiedinformation. This standard is uses identical keys for the purpose of encrypting as well asdecrypting the messages (Karthik & Muruganandam, 2014). This standard can accept any blocksize that is 128 bits and three keys like 128, 192 and 256 bits. AES processes the whole block ofdata in a parallel manner in every round using the techniques of substitutions as well aspermutations.DES: Data Encryption Standard is considered to be one of the key standards ofencryption. This is also symmetric in nature (ISLAM & AZAD, 2014). The sender as well as thereceiver is aware of the keys. It was designed by IBM. The size of the key used by DES is 64 bitsbut the actual size is 56 bits because 8 bits are used for checking parity. DES is a public standard.Triple DES: This is an advanced form of DES. The main feature of this algorithm is thatit makes the use of three keys (Barker & Barker, 2012). The encryption technique that is used inTriple DES is same as that of DES but here it is repeated three times. The first key that is usedfor encrypting the data is of size 56 bits (Bhanot & Hans, 2015). The second key that is used fordecrypting the data is of size 112 bits and the third key that is again used for the purpose ofencrypting the data is of size 168 bits. Part 2: Security Challenges of WPAN TechnologiesBluetooth: The Bluetooth technology is exposed to various security threats as well asrisks. One of the main security issues is the Bluesnarfing attack where an attacker hacks into the
Security Challenges of WPAN Technologies_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Challenges of Two Examples of WPAN Technologies
|10
|2284
|172

Three Data Encryption Standards for WIMAX Networks Part 1: Wireless Networks
|14
|1565
|42

Assignment Wireless Networking (WSNs)
|9
|1464
|252

Wireless Sensor Networks (WSN) Assignment
|10
|1524
|35

Data Encryption Standards for WIMAX
|19
|1868
|69

Wireless Networking Concepts Name of the Student Name of the University Author
|7
|1211
|425