logo

Three Data Encryption Standards for WIMAX Networks Part 1: Wireless Networks

   

Added on  2020-04-01

14 Pages1565 Words42 Views
Running head: WIRELESS NETWORKSWireless NetworksName of the StudentName of the UniversityAuthor’s note

1WIRELESS NETWORKSTable of ContentsPart 1: Three Data Encryption Standards for WIMAX Networks.......................................2Part 2: Security Challenges of WPAN Technologies..........................................................3Part 3: Critical Reflection on Energy Harvest.....................................................................4Part 4: Digital Cellular Handsets.........................................................................................5References..........................................................................................................................13

2WIRELESS NETWORKSPart 1: Three Data Encryption Standards for WIMAX NetworksRSA: This cryptographic algorithm was designed by Rivest, Shamir and Adleman in theyear 1977. It is a public key encryption standard. This algorithm makes the use of large integernumbers. According to this algorithm an individual will use one public and one private key. Thesender will use the receiver’s public key to encrypt the message that will result in cipher text.The receiver will be able to read the message by decrypting the message using its own privatekey (Jonsson et al., 2016). RSA has invented the concept of digital signature. This algorithm isbased on the problem of factorizing the product of two different large prime integers or numbers.RSA is a secured cryptographic algorithm.DES: Data Encryption Standard is a symmetric key algorithm. It was developed by theresearch team of IBM. Same keys are used for the purpose of encrypting as well as decryptingmessages. Two techniques called diffusion and confusion are used in DES. There are sixteenrounds present in DES (ISLAM & AZAD, 2014). The confusion technique uses XOR operation.The size of plain text is 64 bits. The key size used here is 56 bits. The Triple DES is more securethan DES as the message is first encrypted then it is decrypted and again it is encrypted (Barker& Barker, 2012).AES: Advanced Encryption Standard was developed after DES and Triple DES. It has asimple design and low cost of memory as compared to DES. The speed of this algorithm ishigher than the other algorithms (Karthik & Muruganandam, 2014). Size of the plain as well ascipher text is same. It is a symmetric algorithm and uses identical keys for encrypting anddecrypting messages unlike RSA. Encryption is done by substitution, shifting and mixing of bits.

3WIRELESS NETWORKSThe message block size used in AES is 128 bits and there are three keys. AES is gives betterperformance as compared to DES.Part 2: Security Challenges of WPAN TechnologiesSecurity Challenges of Bluetooth Technology: Bluetooth technology allows severalwireless devices to connect over a short distance. The mobile phone users can turn on theBluetooth options in their phones and pair with another device in order to share files and otherdocuments. There are several security challenges that exist in this technology. Malicious codesenter the devices through a file and affect the system. Viruses can damage the system and misusethe valuable information present in the device. Bluesnarfing attack accesses personalphotographs and details in an unauthorized manner (Minar & Tarique, 2012). When the attackeris able to pair with other devices for the purpose of misusing data then it is called Bluejackingattack (Padgette, 2017). Backdoor hacking is a technique where the attacker accesses the data ofa system secretly and the victim remains unaware of this unauthorized access. The private areanetwork created by Bluetooth technology is prone to various security risks and attacks.Incorporating strong security policies will help to prevent such attacks. Security Challenges in ZigBee: ZigBee standard is used in private area networks orPAN. Remote controls, home automation and many other services like the retail services makeuse of ZigBee. The main security challenge in ZigBee is that the encryption key can get hacked.Sniffing attacks can take place where a monitor or device is able to capture the data exchangesthat are taking place in the network (Zillner & Strobl, 2015). There are several nodes in thenetwork and one of the nodes can hide its identity for the purpose of attacking the encryption keyand the data packets (Wang, Jiang & Zhang, 2014). Injection attacks are also possible in ZigBee

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data Encryption Standards for WIMAX
|19
|1868
|69

Introduction to the Concept on Wireless Networking
|7
|1309
|50

Wireless Sensor Networks (WSN) Assignment
|10
|1524
|35

Assignment Wireless Networking (WSNs)
|9
|1464
|252

Security Challenges of Two Examples of WPAN Technologies
|10
|2284
|172

Wireless Networking Concepts Name of the Student Name of the University Author
|7
|1211
|425