Worldwide Interoperability for Microwave Access

Added on - 07 Apr 2020

  • 7


  • 1963


  • 61


  • 0


Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 7 pages
Running head: WIRELESS NETWORKING CONCEPTWireless networking ConceptName of the StudentName of the UniversityAuthor’s Note
1WIRELESS NETWORKING CONCEPT1. Worldwide Interoperability for Microwave Access (WiMax) is referred as thedelivery of the services to the long wireless broadband access. It provides point-to-point aswell as multipoint applications (Yang, 2014). On the other hand, it is enabled for enhancingsecurity of the network at the time of transmission to the last mile. In addition, WiMaxutilizes three types of data encryption standards in order to protect data as well asinformation. WiMax utilizes Counter Mode with the Cipher Block Chaining MessageAuthentication Code Protocol (CCMP) in order to encrypt traffic on the particular network.Moreover, it utilizes Advanced Encryption Standard in order to transmit data securely.The data encryption standard utilized by WiMx can be explained as followed.Triple DESIt has intended to supplant original Data Encryption Standard algorithm that is figuredby the hackers at the end for figuring out the procedure to vanquish in effortlessly. TripleDES has suggested the standard as well as the most generally used symmetric algorithm inthe business. It uses three individual keys with 56 bits each. In addition, the aggregate keylength is measured as 168 bits (Guo et al, 2014). On the other hand, specialists havecontended that there are 112 bits are included in 112 bits in the key quality that is moresimilar to the process. Thus, in spite of gradually eliminated, there are triple DES that canstill figure out the procedure to make a tried as well as encryption for true equipmentencryption answer for the administrators along with distinctive projects.AESThe Advanced Encryption Standard (AES) is recognized as the algorithm that istrusted as the standard by the Government of USA as well as several organizations. In spiteof the particular fact, it is a great degree, which is proficient in 128 piece frame format. Inaddition, the Advanced Encryption Standard (AES) uses the keys of 192 as well as 256 bits
2WIRELESS NETWORKING CONCEPTfor the substantial obligation encryption purposes. AES is viewed as making impenetrable tothe assaults, which is except for making savage power. It endeavors to make disentanglemessages using each of the single and conceivable blend in 128, 192 as well as 256 piece(Huang et al., 2013). On contrary, there are security specialist that is trusted in making theprocess single conceivable and in the end to be hailed as the right standard in order to encodeinformation in the particular private sector.RSARSA is considered as the open key encryption algorithm as well as the standard toscramble information that is sent over the web. It generally occurs on different strategies thatare used as the part of PGP as well as GPG programs. On the other hand, it is dissimilar to thetriple DE and RSA that are viewed as asymmetric algorithm as the use of the keys areincluded in this. In this perspective, the key is generally open and the particular things used inorder to scramble the message as well as private keys for decoding. However, theconsequences of RSA encryption is considered as immense clump, which gets aggressors oftimes as well as preparing energy for break.2. It is important to identify the most important WPAN technologies that areBluetooth as well as Zigbee. In addition, there are several security challenges in Bluetoothdevices as well as technology at present usages. On the other hand, it is important to mentionthat there are several attacks against the confidentiality as well as integrity of data (Dehwahet al., 2015). Moreover, Bluetooth does not provide effective customer verification.Authorization of the Bluetooth devices cannot be achieved, which can cause explicit behaviorof the connected devices. In this perspective, it is important to mention that there is a massivethreat for DoS attacks on the Bluetooth devices at the time of transmission of data as well asinformation. It can be malicious entry of the external parties at the time of transmission
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document