Analysis of Security Technologies in Wireless Sensor Networks Report
VerifiedAdded on  2020/03/23
|9
|2475
|65
Report
AI Summary
This report provides a comprehensive analysis of various security technologies and their applications in wireless networks and sensor systems. It begins with an overview of key management concepts, including PKMv2, EAP, and AES, explaining their roles in encryption key management, authentication, and data security. The report then delves into the security issues associated with Bluetooth, detailing vulnerabilities such as eavesdropping, impersonation, and person-in-the-middle attacks. It also addresses the security challenges in ZigBee networks, including key attacks and replay attacks. Furthermore, the report explores energy harvesting techniques in wireless sensor networks (WSNs), discussing methods to maximize energy efficiency and extend network lifetime. The discussion includes radio frequency-based energy harvesting and protocol adaptations. The report concludes with a look at the importance of considering energy harvesting in the design of wireless communication systems and highlights the future challenges in signal processing and networking layers.

report
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Answer 1:.........................................................................................................................................2
Answer 2:.........................................................................................................................................4
Answer 3:.........................................................................................................................................5
References........................................................................................................................................8
Answer 1:.........................................................................................................................................2
Answer 2:.........................................................................................................................................4
Answer 3:.........................................................................................................................................5
References........................................................................................................................................8

Answer 1:
PKMv2: The encryption key management is considered as the administration of the tasks which
is for the protection, storing and then backing up all the encryption keys. There are different
high-profile data losses and the regulatory standards which leads to the increase in the use of the
encryption. With this, the useof the encryption tools are set with the secured storage, protection
and the retrieval. There are different forms of the measures which include the Key Management
Interoperability Protocol which has been developed by the vendors and then submitted for the
Structured Information Standards. The management type for the encryption keys are set to
convert the data into the streams with the symmetric key algorithms that make use of the single
key to secure the authentication and achieve the confidentiality and authentication. The
encryption and the storage with the backup is important for protection from the loss, corruption
and any unauthorised form of the access (Rath et al., 2016). The processes could be used for the
controlling keys with the easy management that includes the keys with the easy management of
how the different keys are assigned for the evaluation. PKMv2 is also for handling the
encryption of the data with the management of the keys, and the key recovery procedures which
are set in place. It will be able to take hold of the central key repository with a proper protection
standard.
EAP: The protocol is for the authentication framework which is mainly used in the wireless
networks and to handle the point-to-point connections. They are for the authentication based on
the transport and handling the usage of the key material and parameters. The EAP is one of the
best formwork for the data security standards which includes the functions and the negotiation of
the authentication methods. There are different packets which are for the Lightweight EAP that
PKMv2: The encryption key management is considered as the administration of the tasks which
is for the protection, storing and then backing up all the encryption keys. There are different
high-profile data losses and the regulatory standards which leads to the increase in the use of the
encryption. With this, the useof the encryption tools are set with the secured storage, protection
and the retrieval. There are different forms of the measures which include the Key Management
Interoperability Protocol which has been developed by the vendors and then submitted for the
Structured Information Standards. The management type for the encryption keys are set to
convert the data into the streams with the symmetric key algorithms that make use of the single
key to secure the authentication and achieve the confidentiality and authentication. The
encryption and the storage with the backup is important for protection from the loss, corruption
and any unauthorised form of the access (Rath et al., 2016). The processes could be used for the
controlling keys with the easy management that includes the keys with the easy management of
how the different keys are assigned for the evaluation. PKMv2 is also for handling the
encryption of the data with the management of the keys, and the key recovery procedures which
are set in place. It will be able to take hold of the central key repository with a proper protection
standard.
EAP: The protocol is for the authentication framework which is mainly used in the wireless
networks and to handle the point-to-point connections. They are for the authentication based on
the transport and handling the usage of the key material and parameters. The EAP is one of the
best formwork for the data security standards which includes the functions and the negotiation of
the authentication methods. There are different packets which are for the Lightweight EAP that
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

is used with the IEEE ratification in 802.11 security standards. The forms include the detailed
analysis with the use of one-time password which can generate the authentication keys. The EAP
method is also for the two-factor user authentication where the user needs the physical access to
the token and the knowledge with the personal identification number (Alavi et al., 2016). The
protected communication channels with the mutual authentication is for the parties to
communicate and has been designed for the authentication over the insecure networks. The
documentation is related to the RFC where the schemes are based on providing the resistance to
the active attack, passive and dictionary attack.
EAS: The Advanced Encryption Standards are mainly defined with the use of the designing
principles and the substitution. The combination is based on the substitution and the permutation
framework. It works on the security standards with the key space that increased by the factor of
and how the additional bit of the key length can handle the brute force search which increase
with the key length. The measures are taken to analyse the side channel attacks which do not
tend to work with the cipher as the black box (Zhou et al.,2016). The attack implementations on
the hardware or the software systems tend to leak the data with the major focus on the different
AES forms. The AES is also for the encryption with the symmetric block cipher which could be
for the protection of the information and then working over the implementation in the software
and the hardware through the world to handle the data encryption. The security, cost and
implementation are some of the important features which are set to handle the designing with
128-bit blocks to make use of the key sized at 128,192 and 256 bits. The costs are related to the
standards that include the hardware or the software. AES works on the different transformation
which includes the data stored in the array. This is also then put for cipher to handle the
transformation over the number of the encryption rounds.
analysis with the use of one-time password which can generate the authentication keys. The EAP
method is also for the two-factor user authentication where the user needs the physical access to
the token and the knowledge with the personal identification number (Alavi et al., 2016). The
protected communication channels with the mutual authentication is for the parties to
communicate and has been designed for the authentication over the insecure networks. The
documentation is related to the RFC where the schemes are based on providing the resistance to
the active attack, passive and dictionary attack.
EAS: The Advanced Encryption Standards are mainly defined with the use of the designing
principles and the substitution. The combination is based on the substitution and the permutation
framework. It works on the security standards with the key space that increased by the factor of
and how the additional bit of the key length can handle the brute force search which increase
with the key length. The measures are taken to analyse the side channel attacks which do not
tend to work with the cipher as the black box (Zhou et al.,2016). The attack implementations on
the hardware or the software systems tend to leak the data with the major focus on the different
AES forms. The AES is also for the encryption with the symmetric block cipher which could be
for the protection of the information and then working over the implementation in the software
and the hardware through the world to handle the data encryption. The security, cost and
implementation are some of the important features which are set to handle the designing with
128-bit blocks to make use of the key sized at 128,192 and 256 bits. The costs are related to the
standards that include the hardware or the software. AES works on the different transformation
which includes the data stored in the array. This is also then put for cipher to handle the
transformation over the number of the encryption rounds.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Answer 2:
The security issues of the Bluetooth attacks against the confidentiality, data integrity and the
availability. There are configurations which are based on the theft and the loss, eavesdropping
and the impersonation. The default configuration is the major security issue, where the
information can be used for the impersonation, or the location correlation mainly for the
profiling. The Bluetooth enabled devices to have the minimised security level with the security
mode 1 that has been set by default (Ba et al, 2017). There is other default configuration of the
devices which intend to make up the initial use and the setup of the devices. The theft and the
loss for the electronic computing of the devices is based on the advancement of the technology.
The impersonation and the eavesdropping are some of the issues which needs to be taken care for
the proper communication. Here, the devices also allow the individual to intercept or listen on
the communication mainly in between the two parties (Huang et al., 2016).
The frequency of the hopping algorithm could easily be circumvented using the Bluetooth
listening device which are set through the vendors as devices for mainly diagnosing the different
issues of the Bluetooth communication. The person-in-the-middle attack is mainly the attack that
leverage the vulnerabilities in the baseband specifications. The Bluetooth devices can easily
intercept with the communication and the attacker tends to impersonate the victim devices. The
service mapping and the access using Bluetooth technology is mainly used for encryption the
attack is mainly to determine the valuable information with the attacker determining the attack
on the system. The visualisation of the corporate site is when the LAP (LAN Access Points) are
The security issues of the Bluetooth attacks against the confidentiality, data integrity and the
availability. There are configurations which are based on the theft and the loss, eavesdropping
and the impersonation. The default configuration is the major security issue, where the
information can be used for the impersonation, or the location correlation mainly for the
profiling. The Bluetooth enabled devices to have the minimised security level with the security
mode 1 that has been set by default (Ba et al, 2017). There is other default configuration of the
devices which intend to make up the initial use and the setup of the devices. The theft and the
loss for the electronic computing of the devices is based on the advancement of the technology.
The impersonation and the eavesdropping are some of the issues which needs to be taken care for
the proper communication. Here, the devices also allow the individual to intercept or listen on
the communication mainly in between the two parties (Huang et al., 2016).
The frequency of the hopping algorithm could easily be circumvented using the Bluetooth
listening device which are set through the vendors as devices for mainly diagnosing the different
issues of the Bluetooth communication. The person-in-the-middle attack is mainly the attack that
leverage the vulnerabilities in the baseband specifications. The Bluetooth devices can easily
intercept with the communication and the attacker tends to impersonate the victim devices. The
service mapping and the access using Bluetooth technology is mainly used for encryption the
attack is mainly to determine the valuable information with the attacker determining the attack
on the system. The visualisation of the corporate site is when the LAP (LAN Access Points) are

strategically deployed with the profiling based on the Bluetooth specifications and connection to
the LAN infrastructure.
The other example which is used is ZigBee where the security challenges are mainly to find the
encryption key by the snapping. The wireless attacks are mainly the attacks which fall under the
physical, key and the replay or injection attacks. The physical attacks are mainly the ones which
includes the ZigBee radio with the focus on ability to interact physically with the device to
obtain the encryption key that is used for the target of the network. With this, there are other
issues related to the attackers who can utilise the serial interfaces with capturing the encryption
keys based on low cost and open source tools (Fourmeau et al., 2017). The key attacks are
mainly for the utilisation of the encryption with the pre-shared keying and Over the Air key
delivery. The security includes the intrusion detection capabilities which works with the support
of low-cost ZigBee radios. The attacker who is using the hardware and the software based tools
has the capability to perform any of the illicit actions with the connection of the devices to
perform the attack. The replay and the injection attacks could be for the packet replay (Das et al.,
2016). With this, the issues are mainly susceptible with the lightweight designing of the protocol.
Along with this, the malicious user tends to make use of the radio to collect the packets which
are being transmitted from the network of ZigBee. Through this, one is also not able to decode
the packets as per the requirement. The network mimicking or the origination of the nodes is also
not possible due to the minimal session check which is performed by the ZigBee radios.
Answer 3:
According to Shaikh et al., (2016)., the wireless sensor has been mainly set with the pervasive
and thee wide deployment of the IoT. The systems are set with the limited energy associated that
the LAN infrastructure.
The other example which is used is ZigBee where the security challenges are mainly to find the
encryption key by the snapping. The wireless attacks are mainly the attacks which fall under the
physical, key and the replay or injection attacks. The physical attacks are mainly the ones which
includes the ZigBee radio with the focus on ability to interact physically with the device to
obtain the encryption key that is used for the target of the network. With this, there are other
issues related to the attackers who can utilise the serial interfaces with capturing the encryption
keys based on low cost and open source tools (Fourmeau et al., 2017). The key attacks are
mainly for the utilisation of the encryption with the pre-shared keying and Over the Air key
delivery. The security includes the intrusion detection capabilities which works with the support
of low-cost ZigBee radios. The attacker who is using the hardware and the software based tools
has the capability to perform any of the illicit actions with the connection of the devices to
perform the attack. The replay and the injection attacks could be for the packet replay (Das et al.,
2016). With this, the issues are mainly susceptible with the lightweight designing of the protocol.
Along with this, the malicious user tends to make use of the radio to collect the packets which
are being transmitted from the network of ZigBee. Through this, one is also not able to decode
the packets as per the requirement. The network mimicking or the origination of the nodes is also
not possible due to the minimal session check which is performed by the ZigBee radios.
Answer 3:
According to Shaikh et al., (2016)., the wireless sensor has been mainly set with the pervasive
and thee wide deployment of the IoT. The systems are set with the limited energy associated that
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

is the major bottleneck of the technologies. The discussion is about the maximisation of the
energy which is harvested in WSNs with the identification of the cost effective, efficient and the
reliable energy harvesting systems (Benaatou et al., 2017).
It includes the motivation for the energy harvesting with the detailed focus on the static sensor
nodes that have the lower power of processing and the limited capabilities of the power as well.
For this, the deployment is mainly in the ad-hoc manner which tends to cooperate to form the
wireless sensor network. The sensing subsystems are mainly to acquire the data and the
processing which is for handling the data in the local form. The wireless communication with the
battery and the limited energy budget can take hold of the power with the use of the sensor for
the sub-systems. The forms re set with the minimisation of the communication cost, where the
approach is mainly to make use of the network processing, data prediction and then sending the
data as per the requirement. The mobility in WSN can also help in reducing the energy
consumption which incurs with the lower overheads. The mobility expends with more energy
with motors and the other hardware working with more energy. The radio frequency based
energy harvesting is mainly based on the sensor nodes which can easily be used for the two
radios with RF and the other for the communication with the sensor nodes. The optimisation of
the solution is set with the RFID tags that could easily be viewed with harvesting solutions that
are in the market. The RFID reader is also able to send the signals to query the tags with the
response with identification by powering from the inductance of the loop. It also includes the
identification of the techniques that needs to be leveraged with the ambient environment and the
external sources which is mainly to generate the energy for the WSNs. For the protocol
adaptation, the focus is on how the energy efficiency with the network protocol could be
maximised with lifetime network setup.
energy which is harvested in WSNs with the identification of the cost effective, efficient and the
reliable energy harvesting systems (Benaatou et al., 2017).
It includes the motivation for the energy harvesting with the detailed focus on the static sensor
nodes that have the lower power of processing and the limited capabilities of the power as well.
For this, the deployment is mainly in the ad-hoc manner which tends to cooperate to form the
wireless sensor network. The sensing subsystems are mainly to acquire the data and the
processing which is for handling the data in the local form. The wireless communication with the
battery and the limited energy budget can take hold of the power with the use of the sensor for
the sub-systems. The forms re set with the minimisation of the communication cost, where the
approach is mainly to make use of the network processing, data prediction and then sending the
data as per the requirement. The mobility in WSN can also help in reducing the energy
consumption which incurs with the lower overheads. The mobility expends with more energy
with motors and the other hardware working with more energy. The radio frequency based
energy harvesting is mainly based on the sensor nodes which can easily be used for the two
radios with RF and the other for the communication with the sensor nodes. The optimisation of
the solution is set with the RFID tags that could easily be viewed with harvesting solutions that
are in the market. The RFID reader is also able to send the signals to query the tags with the
response with identification by powering from the inductance of the loop. It also includes the
identification of the techniques that needs to be leveraged with the ambient environment and the
external sources which is mainly to generate the energy for the WSNs. For the protocol
adaptation, the focus is on how the energy efficiency with the network protocol could be
maximised with lifetime network setup.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

According to Ulukus, Sennur, et al. (2015)., the focus of the paper is mainly on handling the
broad areas for the energy harvesting wireless communications. The different standards are
based on how the energy harvesting wireless networks can develop the new medical and the
better environment surveillance which is impossible, otherwise. With this, there are other
associated with the solar, indoor lighting with the energy harvested from the man-made sources
using the wireless technologies. The forms are set with the schemes with dimensions to the
wireless communication in the form of the intermittence and the randomness of the available
energy. The paper is also about the consideration for the throughput maximisation with working
over the energy harvests. The focus is also on considering the online energy management for the
throughput maximisation. It includes the section that works with the single user channels and the
transmitter has the queues names of the data queue and the energy queue when the arrival of the
data packets is scheduled depending upon the use of the energy in the battery. The article is
about focusing over the standards of the broad area of energy with the ranges set from the
information theoretic physical layer performance with scheduling the policies and the medium
access to control the performance of the protocols. The consideration is about working over the
physical properties with the storage imperfections, consumption models and the other processing
costs which are important for working over the energy harvesting profiles. The area of the energy
is mainly to take hold of the device and the circuit technologies with the connections to the
different layers of the network designing. The future challenges for the signal processing and the
communications are for the different networking layers where the advancement is from the
circuits and the devices that tend to harvest and handle the transfer of energy.
broad areas for the energy harvesting wireless communications. The different standards are
based on how the energy harvesting wireless networks can develop the new medical and the
better environment surveillance which is impossible, otherwise. With this, there are other
associated with the solar, indoor lighting with the energy harvested from the man-made sources
using the wireless technologies. The forms are set with the schemes with dimensions to the
wireless communication in the form of the intermittence and the randomness of the available
energy. The paper is also about the consideration for the throughput maximisation with working
over the energy harvests. The focus is also on considering the online energy management for the
throughput maximisation. It includes the section that works with the single user channels and the
transmitter has the queues names of the data queue and the energy queue when the arrival of the
data packets is scheduled depending upon the use of the energy in the battery. The article is
about focusing over the standards of the broad area of energy with the ranges set from the
information theoretic physical layer performance with scheduling the policies and the medium
access to control the performance of the protocols. The consideration is about working over the
physical properties with the storage imperfections, consumption models and the other processing
costs which are important for working over the energy harvesting profiles. The area of the energy
is mainly to take hold of the device and the circuit technologies with the connections to the
different layers of the network designing. The future challenges for the signal processing and the
communications are for the different networking layers where the advancement is from the
circuits and the devices that tend to harvest and handle the transfer of energy.

References
Alavi, M. A., Fernando, W. P. U., Permuna, P. A. Y. P., Jayathilake, K. D. K. C., Mathurusha, S.,
Vithanage, N. S., & Dhammearatchi, D. (2016). Enhanced QoS support in OFDMA-Based
WiMAX Systems. Compusoft, 5(4), 2090.
Ba, P. N., Ouya, S., Farssi, S. M., Maiga, A., Raimy, A., & Rodrigues, J. J. (2017, May). Modeling of a
LTE and WIMAX mobile networks SINR-based heterogeneous system-the case of the Virtual
University of Senegal. In Communications Workshops (ICC Workshops), 2017 IEEE International
Conference on (pp. 1293-1298). IEEE.
Benaatou, W., Latif, A., Pla, V., & Baba, M. D. (2017, June). Handover based on a multi criteria approach
in WiMax networks. In Wireless Communications and Mobile Computing Conference (IWCMC),
2017 13th International(pp. 1974-1979). IEEE.
Das, S., & Sen, S. (2016). ANALYSIS OF WIRELESS NETWORK THROUGH WIMAX IN QUALNET.
Fourneau, J. M., Mokdad, L., Othman, J. B., & Abdelli, A. (2017, March). Admission Control Based on
WRR in WiMAX Networks. In Wireless Communications and Networking Conference (WCNC),
2017 IEEE (pp. 1-6). IEEE.
Huang, J., & Huang, C. T. (2016). Design and Verification of Secure Mutual Authentication Protocols for
Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations. Journal of
Electrical and Computer Engineering, 2016.
Rath, H. K., Karandikar, A., & Sharma, V. (2016). TCP-aware Cross Layer Scheduling with Adaptive
Modulation in IEEE 802.16 (WiMAX) Networks. arXiv preprint arXiv:1612.02732.
Zhou, J., Ma, M., Feng, Y., & Nguyen, T. N. (2016). A symmetric key-based pre-authentication protocol
for secure handover in mobile WiMAX networks. The Journal of Supercomputing, 72(7), 2734-
2751.
Alavi, M. A., Fernando, W. P. U., Permuna, P. A. Y. P., Jayathilake, K. D. K. C., Mathurusha, S.,
Vithanage, N. S., & Dhammearatchi, D. (2016). Enhanced QoS support in OFDMA-Based
WiMAX Systems. Compusoft, 5(4), 2090.
Ba, P. N., Ouya, S., Farssi, S. M., Maiga, A., Raimy, A., & Rodrigues, J. J. (2017, May). Modeling of a
LTE and WIMAX mobile networks SINR-based heterogeneous system-the case of the Virtual
University of Senegal. In Communications Workshops (ICC Workshops), 2017 IEEE International
Conference on (pp. 1293-1298). IEEE.
Benaatou, W., Latif, A., Pla, V., & Baba, M. D. (2017, June). Handover based on a multi criteria approach
in WiMax networks. In Wireless Communications and Mobile Computing Conference (IWCMC),
2017 13th International(pp. 1974-1979). IEEE.
Das, S., & Sen, S. (2016). ANALYSIS OF WIRELESS NETWORK THROUGH WIMAX IN QUALNET.
Fourneau, J. M., Mokdad, L., Othman, J. B., & Abdelli, A. (2017, March). Admission Control Based on
WRR in WiMAX Networks. In Wireless Communications and Networking Conference (WCNC),
2017 IEEE (pp. 1-6). IEEE.
Huang, J., & Huang, C. T. (2016). Design and Verification of Secure Mutual Authentication Protocols for
Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations. Journal of
Electrical and Computer Engineering, 2016.
Rath, H. K., Karandikar, A., & Sharma, V. (2016). TCP-aware Cross Layer Scheduling with Adaptive
Modulation in IEEE 802.16 (WiMAX) Networks. arXiv preprint arXiv:1612.02732.
Zhou, J., Ma, M., Feng, Y., & Nguyen, T. N. (2016). A symmetric key-based pre-authentication protocol
for secure handover in mobile WiMAX networks. The Journal of Supercomputing, 72(7), 2734-
2751.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





