Wireless Communication Technologies and Applications
VerifiedAdded on  2020/04/01
|14
|1565
|42
AI Summary
This assignment delves into various aspects of wireless communication. It starts by discussing the concept of energy harvesting in Wireless Sensor Networks (WSNs), highlighting its importance for extending network lifespan. The assignment then shifts focus to digital cellular handsets, examining their capabilities and potential applications beyond traditional telephony, such as accessing and displaying PC documents.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: WIRELESS NETWORKS
Wireless Networks
Name of the Student
Name of the University
Author’s note
Wireless Networks
Name of the Student
Name of the University
Author’s note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
WIRELESS NETWORKS
Table of Contents
Part 1: Three Data Encryption Standards for WIMAX Networks.......................................2
Part 2: Security Challenges of WPAN Technologies..........................................................3
Part 3: Critical Reflection on Energy Harvest.....................................................................4
Part 4: Digital Cellular Handsets.........................................................................................5
References..........................................................................................................................13
WIRELESS NETWORKS
Table of Contents
Part 1: Three Data Encryption Standards for WIMAX Networks.......................................2
Part 2: Security Challenges of WPAN Technologies..........................................................3
Part 3: Critical Reflection on Energy Harvest.....................................................................4
Part 4: Digital Cellular Handsets.........................................................................................5
References..........................................................................................................................13
2
WIRELESS NETWORKS
Part 1: Three Data Encryption Standards for WIMAX Networks
RSA: This cryptographic algorithm was designed by Rivest, Shamir and Adleman in the
year 1977. It is a public key encryption standard. This algorithm makes the use of large integer
numbers. According to this algorithm an individual will use one public and one private key. The
sender will use the receiver’s public key to encrypt the message that will result in cipher text.
The receiver will be able to read the message by decrypting the message using its own private
key (Jonsson et al., 2016). RSA has invented the concept of digital signature. This algorithm is
based on the problem of factorizing the product of two different large prime integers or numbers.
RSA is a secured cryptographic algorithm.
DES: Data Encryption Standard is a symmetric key algorithm. It was developed by the
research team of IBM. Same keys are used for the purpose of encrypting as well as decrypting
messages. Two techniques called diffusion and confusion are used in DES. There are sixteen
rounds present in DES (ISLAM & AZAD, 2014). The confusion technique uses XOR operation.
The size of plain text is 64 bits. The key size used here is 56 bits. The Triple DES is more secure
than DES as the message is first encrypted then it is decrypted and again it is encrypted (Barker
& Barker, 2012).
AES: Advanced Encryption Standard was developed after DES and Triple DES. It has a
simple design and low cost of memory as compared to DES. The speed of this algorithm is
higher than the other algorithms (Karthik & Muruganandam, 2014). Size of the plain as well as
cipher text is same. It is a symmetric algorithm and uses identical keys for encrypting and
decrypting messages unlike RSA. Encryption is done by substitution, shifting and mixing of bits.
WIRELESS NETWORKS
Part 1: Three Data Encryption Standards for WIMAX Networks
RSA: This cryptographic algorithm was designed by Rivest, Shamir and Adleman in the
year 1977. It is a public key encryption standard. This algorithm makes the use of large integer
numbers. According to this algorithm an individual will use one public and one private key. The
sender will use the receiver’s public key to encrypt the message that will result in cipher text.
The receiver will be able to read the message by decrypting the message using its own private
key (Jonsson et al., 2016). RSA has invented the concept of digital signature. This algorithm is
based on the problem of factorizing the product of two different large prime integers or numbers.
RSA is a secured cryptographic algorithm.
DES: Data Encryption Standard is a symmetric key algorithm. It was developed by the
research team of IBM. Same keys are used for the purpose of encrypting as well as decrypting
messages. Two techniques called diffusion and confusion are used in DES. There are sixteen
rounds present in DES (ISLAM & AZAD, 2014). The confusion technique uses XOR operation.
The size of plain text is 64 bits. The key size used here is 56 bits. The Triple DES is more secure
than DES as the message is first encrypted then it is decrypted and again it is encrypted (Barker
& Barker, 2012).
AES: Advanced Encryption Standard was developed after DES and Triple DES. It has a
simple design and low cost of memory as compared to DES. The speed of this algorithm is
higher than the other algorithms (Karthik & Muruganandam, 2014). Size of the plain as well as
cipher text is same. It is a symmetric algorithm and uses identical keys for encrypting and
decrypting messages unlike RSA. Encryption is done by substitution, shifting and mixing of bits.
3
WIRELESS NETWORKS
The message block size used in AES is 128 bits and there are three keys. AES is gives better
performance as compared to DES.
Part 2: Security Challenges of WPAN Technologies
Security Challenges of Bluetooth Technology: Bluetooth technology allows several
wireless devices to connect over a short distance. The mobile phone users can turn on the
Bluetooth options in their phones and pair with another device in order to share files and other
documents. There are several security challenges that exist in this technology. Malicious codes
enter the devices through a file and affect the system. Viruses can damage the system and misuse
the valuable information present in the device. Bluesnarfing attack accesses personal
photographs and details in an unauthorized manner (Minar & Tarique, 2012). When the attacker
is able to pair with other devices for the purpose of misusing data then it is called Bluejacking
attack (Padgette, 2017). Backdoor hacking is a technique where the attacker accesses the data of
a system secretly and the victim remains unaware of this unauthorized access. The private area
network created by Bluetooth technology is prone to various security risks and attacks.
Incorporating strong security policies will help to prevent such attacks.
Security Challenges in ZigBee: ZigBee standard is used in private area networks or
PAN. Remote controls, home automation and many other services like the retail services make
use of ZigBee. The main security challenge in ZigBee is that the encryption key can get hacked.
Sniffing attacks can take place where a monitor or device is able to capture the data exchanges
that are taking place in the network (Zillner & Strobl, 2015). There are several nodes in the
network and one of the nodes can hide its identity for the purpose of attacking the encryption key
and the data packets (Wang, Jiang & Zhang, 2014). Injection attacks are also possible in ZigBee
WIRELESS NETWORKS
The message block size used in AES is 128 bits and there are three keys. AES is gives better
performance as compared to DES.
Part 2: Security Challenges of WPAN Technologies
Security Challenges of Bluetooth Technology: Bluetooth technology allows several
wireless devices to connect over a short distance. The mobile phone users can turn on the
Bluetooth options in their phones and pair with another device in order to share files and other
documents. There are several security challenges that exist in this technology. Malicious codes
enter the devices through a file and affect the system. Viruses can damage the system and misuse
the valuable information present in the device. Bluesnarfing attack accesses personal
photographs and details in an unauthorized manner (Minar & Tarique, 2012). When the attacker
is able to pair with other devices for the purpose of misusing data then it is called Bluejacking
attack (Padgette, 2017). Backdoor hacking is a technique where the attacker accesses the data of
a system secretly and the victim remains unaware of this unauthorized access. The private area
network created by Bluetooth technology is prone to various security risks and attacks.
Incorporating strong security policies will help to prevent such attacks.
Security Challenges in ZigBee: ZigBee standard is used in private area networks or
PAN. Remote controls, home automation and many other services like the retail services make
use of ZigBee. The main security challenge in ZigBee is that the encryption key can get hacked.
Sniffing attacks can take place where a monitor or device is able to capture the data exchanges
that are taking place in the network (Zillner & Strobl, 2015). There are several nodes in the
network and one of the nodes can hide its identity for the purpose of attacking the encryption key
and the data packets (Wang, Jiang & Zhang, 2014). Injection attacks are also possible in ZigBee
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
WIRELESS NETWORKS
as the protocols present in ZigBee are not strong. This makes it vulnerable to different types of
risks and threats.
Part 3: Critical Reflection on Energy Harvest
Energy harvesting focuses on deriving or producing energy form external sources like
kinetic energy, wind energy, thermal energy and solar energy. Hydro energy also plays a major
role in harvesting energy. Energy can be conserved by this technique of energy harvesting. The
wireless networks can store and use the derived energy.
According to Ulukus et al. (2015), the nodes present in wireless networks should have the
capability to harvest energy on its own. This will enable the nodes and the wireless devices of the
network to gain and generate energy continuously. The concept of energy harvesting will benefit
the people of future generation. The energy consumption level will fall by adopting this method.
A balanced or controlled procedure can also be used for harvesting energy. This will involve the
use of human made sources. The efficiency levels of the technologies used will vary. Technical
concepts and methods can be applied for harvesting energy continuously. According to Ulukus et
al. (2015), Gaussian noise and AWGN channel concept can be used for harvesting energy. The
output of this process is the sum of noise and input. Ulukus et al. (2015) presented a concept
where the main focus was in the integration of circuits and devices for energy harvesting and
transferring purpose.
According to Shaikh and Zeadally (2016), WSN technologies have limited energy.
Energy efficient and high performance devices can be used for reducing or minimizing this
problem. There are two main sources of energy like ambient sources and external sources.
Shaikh and Zeadally (2016) said that the ambient sources are the cheapest source of energy.
WIRELESS NETWORKS
as the protocols present in ZigBee are not strong. This makes it vulnerable to different types of
risks and threats.
Part 3: Critical Reflection on Energy Harvest
Energy harvesting focuses on deriving or producing energy form external sources like
kinetic energy, wind energy, thermal energy and solar energy. Hydro energy also plays a major
role in harvesting energy. Energy can be conserved by this technique of energy harvesting. The
wireless networks can store and use the derived energy.
According to Ulukus et al. (2015), the nodes present in wireless networks should have the
capability to harvest energy on its own. This will enable the nodes and the wireless devices of the
network to gain and generate energy continuously. The concept of energy harvesting will benefit
the people of future generation. The energy consumption level will fall by adopting this method.
A balanced or controlled procedure can also be used for harvesting energy. This will involve the
use of human made sources. The efficiency levels of the technologies used will vary. Technical
concepts and methods can be applied for harvesting energy continuously. According to Ulukus et
al. (2015), Gaussian noise and AWGN channel concept can be used for harvesting energy. The
output of this process is the sum of noise and input. Ulukus et al. (2015) presented a concept
where the main focus was in the integration of circuits and devices for energy harvesting and
transferring purpose.
According to Shaikh and Zeadally (2016), WSN technologies have limited energy.
Energy efficient and high performance devices can be used for reducing or minimizing this
problem. There are two main sources of energy like ambient sources and external sources.
Shaikh and Zeadally (2016) said that the ambient sources are the cheapest source of energy.
5
WIRELESS NETWORKS
External sources can be explicitly used for the purpose of energy harvesting. Solar based
technique can be used for the purpose of harvesting energy where the solar energy is utilized. RF
based or radio frequency based techniques can also be used. Wind energy and hydro energy can
be used for the purpose of generating electrical power or electricity. Electricity can be generated
by using turbines. Falling water can be used for the purpose of harnessing energy. Shaikh and
Zeadally (2016) also said that Seebeck effect can be can be applied for converting heat energy
into electrical energy.
Part 4: Digital Cellular Handsets
WIRELESS NETWORKS
External sources can be explicitly used for the purpose of energy harvesting. Solar based
technique can be used for the purpose of harvesting energy where the solar energy is utilized. RF
based or radio frequency based techniques can also be used. Wind energy and hydro energy can
be used for the purpose of generating electrical power or electricity. Electricity can be generated
by using turbines. Falling water can be used for the purpose of harnessing energy. Shaikh and
Zeadally (2016) also said that Seebeck effect can be can be applied for converting heat energy
into electrical energy.
Part 4: Digital Cellular Handsets
6
WIRELESS NETWORKS
Slide note: The Telestra Company is engaged in providing wired telecommunication
services across Australia. Their aim is to implement an advanced wireless field of system.
WIRELESS NETWORKS
Slide note: The Telestra Company is engaged in providing wired telecommunication
services across Australia. Their aim is to implement an advanced wireless field of system.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
WIRELESS NETWORKS
Slide note: Cellular handset is a telecommunication device that takes the help of radio
waves in order to transmit data wirelessly (Goggin, 2012)
Cellular handset is accessible to all and therefore, it would be very beneficial to use it for
accessing and displaying standard PC documents.
WIRELESS NETWORKS
Slide note: Cellular handset is a telecommunication device that takes the help of radio
waves in order to transmit data wirelessly (Goggin, 2012)
Cellular handset is accessible to all and therefore, it would be very beneficial to use it for
accessing and displaying standard PC documents.
8
WIRELESS NETWORKS
WIRELESS NETWORKS
9
WIRELESS NETWORKS
WIRELESS NETWORKS
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
WIRELESS NETWORKS
WIRELESS NETWORKS
11
WIRELESS NETWORKS
WIRELESS NETWORKS
12
WIRELESS NETWORKS
WIRELESS NETWORKS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
WIRELESS NETWORKS
References
Barker, W. C., & Barker, E. B. (2012). SP 800-67 Rev. 1. Recommendation for the Triple Data
Encryption Algorithm (TDEA) Block Cipher.
ISLAM, E., & AZAD, S. (2014). data encryption standard. Practical Cryptography:
Algorithms and Implementations Using C++, 57.
Jonsson, J., Moriarty, K., Kaliski, B., & Rusch, A. (2016). PKCS# 1: RSA Cryptography
Specifications Version 2.2.
Karthik, S., & Muruganandam, A. (2014). Data Encryption and Decryption by using Triple
DES and performance analysis of crypto system. International Journal of Scientific
Engineering and Research, 24-31.
Minar, N. B. N. I., & Tarique, M. (2012). Bluetooth security threats and solutions: a
survey. International Journal of Distributed and Parallel Systems, 3(1), 127.
Padgette, J. (2017). Guide to bluetooth security. NIST Special Publication, 800, 121.
Shaikh, F. K., & Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A
comprehensive review. Renewable and Sustainable Energy Reviews, 55, 1041-1054.
Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., & Huang, K. (2015).
Energy harvesting wireless communications: A review of recent advances. IEEE
Journal on Selected Areas in Communications, 33(3), 360-381.
WIRELESS NETWORKS
References
Barker, W. C., & Barker, E. B. (2012). SP 800-67 Rev. 1. Recommendation for the Triple Data
Encryption Algorithm (TDEA) Block Cipher.
ISLAM, E., & AZAD, S. (2014). data encryption standard. Practical Cryptography:
Algorithms and Implementations Using C++, 57.
Jonsson, J., Moriarty, K., Kaliski, B., & Rusch, A. (2016). PKCS# 1: RSA Cryptography
Specifications Version 2.2.
Karthik, S., & Muruganandam, A. (2014). Data Encryption and Decryption by using Triple
DES and performance analysis of crypto system. International Journal of Scientific
Engineering and Research, 24-31.
Minar, N. B. N. I., & Tarique, M. (2012). Bluetooth security threats and solutions: a
survey. International Journal of Distributed and Parallel Systems, 3(1), 127.
Padgette, J. (2017). Guide to bluetooth security. NIST Special Publication, 800, 121.
Shaikh, F. K., & Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A
comprehensive review. Renewable and Sustainable Energy Reviews, 55, 1041-1054.
Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., & Huang, K. (2015).
Energy harvesting wireless communications: A review of recent advances. IEEE
Journal on Selected Areas in Communications, 33(3), 360-381.
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.