WiMAX Networks and WPAN Security
VerifiedAdded on  2019/11/08
|6
|928
|23
Report
AI Summary
This report examines three data encryption standards for WiMAX networks: Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), Advanced Encryption Standard (AES), and PKM-EAP (Extensible Authentication Protocol). It details the functionalities and strengths of each. The report also analyzes security challenges for two Wireless Personal Area Network (WPAN) technologies: Bluetooth and ZigBee, highlighting vulnerabilities like disclosure threats, integrity threats, denial-of-service attacks, and key-related issues. Finally, it provides commentary on two research papers, one focusing on energy harvesting in wireless communication and the other on the taxonomy of energy resources for various applications. The report concludes by listing relevant references.

report
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Three data encryption standards for WiMAX networks..................................................................2
Security challenges for any two examples of WPAN technologies................................................3
Read the following two research papers and comment...................................................................3
References........................................................................................................................................5
Three data encryption standards for WiMAX networks..................................................................2
Security challenges for any two examples of WPAN technologies................................................3
Read the following two research papers and comment...................................................................3
References........................................................................................................................................5

Three data encryption standards for WiMAX networks
a. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
This is for the encryption of all the traffic on the network. This takes hold of the encapsulated
mechanism which is for the confidentiality of the data. It is mainly to create and address the
vulnerabilities which are presented by WEP (Taheri et al., 2017). The forms are set with the
CCMP Medium Access Control Protocol to define the sections and the control through the
incremented sets of the data packet. It also includes the reserving of the data confidentiality,
authentication and the access control. It is mainly in conjunction with the layer management. The
formats and the standards are for the theoretical strength of the key which is 2^n.
b. Advanced Encryption Standard (AES)
For the proper management and easy transmission of the data in a secured manner. It makes use
of the Wi-Fi and has a stronger encryption key management (Gautam et al., 2016). The
advancement is based on handling the information technology with the blocking of the ciphers.
This works on handling the different encryption packages with the access cipher that allows the
secret information to be used in the NSA format to be approved with the cryptographic module.
The algorithm can handle the evaluation based on the system standards.
c. PKM-EAP (Extensible Authentication Protocol)
This includes the functioning which has end-to-end authentication. This includes the entity
where the mechanism is made to ensure about the valid users who can access to the WiMAX
network. With this, there is a use of the service providers where the access control is based on
the dial up modems (Alamifar et al. 2016).
a. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
This is for the encryption of all the traffic on the network. This takes hold of the encapsulated
mechanism which is for the confidentiality of the data. It is mainly to create and address the
vulnerabilities which are presented by WEP (Taheri et al., 2017). The forms are set with the
CCMP Medium Access Control Protocol to define the sections and the control through the
incremented sets of the data packet. It also includes the reserving of the data confidentiality,
authentication and the access control. It is mainly in conjunction with the layer management. The
formats and the standards are for the theoretical strength of the key which is 2^n.
b. Advanced Encryption Standard (AES)
For the proper management and easy transmission of the data in a secured manner. It makes use
of the Wi-Fi and has a stronger encryption key management (Gautam et al., 2016). The
advancement is based on handling the information technology with the blocking of the ciphers.
This works on handling the different encryption packages with the access cipher that allows the
secret information to be used in the NSA format to be approved with the cryptographic module.
The algorithm can handle the evaluation based on the system standards.
c. PKM-EAP (Extensible Authentication Protocol)
This includes the functioning which has end-to-end authentication. This includes the entity
where the mechanism is made to ensure about the valid users who can access to the WiMAX
network. With this, there is a use of the service providers where the access control is based on
the dial up modems (Alamifar et al. 2016).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Security challenges for any two examples of WPAN
technologies
The Bluetooth network vulnerabilities are the disclosure threat, integrity threat and the denial of
service threat where the users are blocked to get the access to a service by either handling the
unavailability or severely limiting the availability. The security is important with handling the
transmission of the architecture that needs a consistent upgradation with preventing any new
threats. The Bluetooth devices generally are exposed to the malicious threats at the time of
pairing with the other device. The weakness is mainly due to the flaws which are related to the
establishment of the key protocol and handling the devices to pair with the focus on the
performance and pairing (Kaur & Sharma, 2016).
The issues with the ZigBee are the attacks which are related to the industry security professionals
and the physical attacks, key and the replay of the injection attacks. The attacker can easily gain
the physical access to the device which includes the attacks so that it is effective to interact
physically. With this, there other issues of the utilisation of the remote means to obtain the
encryption keys. The key attacks are for the security and the ease of updating.
Read the following two research papers and comment
a. The research is about the wide deployment in the Internet of Things, Cyber Physical
Systems and the other emerging areas. The taxonomy of the different energy resources
could be to handle the potential with the maximisation of the energy harvested. The
identification of the different challenges is related to addressing the development of the
cost effectiveness, efficiency and the reliable energy harvesting systems. This also
technologies
The Bluetooth network vulnerabilities are the disclosure threat, integrity threat and the denial of
service threat where the users are blocked to get the access to a service by either handling the
unavailability or severely limiting the availability. The security is important with handling the
transmission of the architecture that needs a consistent upgradation with preventing any new
threats. The Bluetooth devices generally are exposed to the malicious threats at the time of
pairing with the other device. The weakness is mainly due to the flaws which are related to the
establishment of the key protocol and handling the devices to pair with the focus on the
performance and pairing (Kaur & Sharma, 2016).
The issues with the ZigBee are the attacks which are related to the industry security professionals
and the physical attacks, key and the replay of the injection attacks. The attacker can easily gain
the physical access to the device which includes the attacks so that it is effective to interact
physically. With this, there other issues of the utilisation of the remote means to obtain the
encryption keys. The key attacks are for the security and the ease of updating.
Read the following two research papers and comment
a. The research is about the wide deployment in the Internet of Things, Cyber Physical
Systems and the other emerging areas. The taxonomy of the different energy resources
could be to handle the potential with the maximisation of the energy harvested. The
identification of the different challenges is related to addressing the development of the
cost effectiveness, efficiency and the reliable energy harvesting systems. This also
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

includes the details discussion and the evaluation based on the vibration harvester,
thermal and the wind harvester as well.
b. The energy harvesting the wireless communication includes the information theoretic
performance which limits to the transmission of the scheduling policies and the resource
allocation. Through this, the focus is on cooperation aspects and the simultaneous energy
matters. The goal of the paper is to focus on thee energy harvesting the wireless
communications with the new dimensions set for the intermittency and the randomness.
The focus is on the summarising of the effects with the self-sufficiency and the perpetual
operations. This is important to handle the control where the number of operations are set
other than the transmissions that incur in the energy costs and the impact of performance.
thermal and the wind harvester as well.
b. The energy harvesting the wireless communication includes the information theoretic
performance which limits to the transmission of the scheduling policies and the resource
allocation. Through this, the focus is on cooperation aspects and the simultaneous energy
matters. The goal of the paper is to focus on thee energy harvesting the wireless
communications with the new dimensions set for the intermittency and the randomness.
The focus is on the summarising of the effects with the self-sufficiency and the perpetual
operations. This is important to handle the control where the number of operations are set
other than the transmissions that incur in the energy costs and the impact of performance.

References
Aalamifar, F., & Lampe, L. (2016). Optimized WiMAX Profile Configuration for Smart Grid
Communications. IEEE Transactions on Smart Grid.
Gautam, A. K., Kumar, L., Kanaujia, B. K., & Rambabu, K. (2016). Design of compact F-shaped slot triple-
band antenna for WLAN/WiMAX applications. IEEE Transactions on Antennas and
Propagation, 64(3), 1101-1105.
Kaur, K., & Sharma, A. (2016). Bandwidth-Aware Stochastic Uplink Scheduling in WIMAX Networks.
Taheri, M. M. S., Abdipour, A., & Pedersen, G. F. (2017, March). Compact penta band printed slot
antenna for GSM, Bluetooth, WiMAX, 4G LTE, and WLAN applications. In Antennas and
Propagation (EUCAP), 2017 11th European Conference on (pp. 2152-2154). IEEE.
Aalamifar, F., & Lampe, L. (2016). Optimized WiMAX Profile Configuration for Smart Grid
Communications. IEEE Transactions on Smart Grid.
Gautam, A. K., Kumar, L., Kanaujia, B. K., & Rambabu, K. (2016). Design of compact F-shaped slot triple-
band antenna for WLAN/WiMAX applications. IEEE Transactions on Antennas and
Propagation, 64(3), 1101-1105.
Kaur, K., & Sharma, A. (2016). Bandwidth-Aware Stochastic Uplink Scheduling in WIMAX Networks.
Taheri, M. M. S., Abdipour, A., & Pedersen, G. F. (2017, March). Compact penta band printed slot
antenna for GSM, Bluetooth, WiMAX, 4G LTE, and WLAN applications. In Antennas and
Propagation (EUCAP), 2017 11th European Conference on (pp. 2152-2154). IEEE.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.