Wireless Networking Technologies and Security Analysis
VerifiedAdded on 2020/04/01
|7
|1457
|44
Report
AI Summary
This report provides an overview of wireless networking concepts, focusing on WiMax and WPAN technologies. It details the security aspects of WiMax, including data encryption standards like Triple DES, AES, and RSA. The report also examines WPAN technologies such as Bluetooth and Zigbee, highlighting their security challenges, including threats like Bluesnarfing and Bluejacking. Furthermore, the report explores energy harvesting in wireless sensor networks (WSNs), discussing various energy sources and related research papers. The analysis includes a review of different approaches to energy harvesting and their impact on the environment and the advancements in this field. The report synthesizes information from multiple sources to provide a comprehensive understanding of wireless networking, security, and energy harvesting.

Running head: WIRELESS NETWORKING CONCEPT
Wireless networking Concept
Name of the Student
Name of the University
Author’s Note
Wireless networking Concept
Name of the Student
Name of the University
Author’s Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
WIRELESS NETWORKING CONCEPT
1. Worldwide Interoperability for Microwave Access (WiMax) refers to the delivery of
services to long mile wireless broadband access (Bernardos et al., 2014). It provides both
multipoint and applications. It has able to improve the network security during transmission to
last mile. WiMax uses three data encryption standards for protecting the data and information.
WiMax uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
(CCMP) to encrypt all traffic on its network (Makris, Skoutas & Skianis, 2013). The data
encryption standards used by WiMax is described as below:
Triple DES
Triple DES used to implement original Data Encryption Standard (DES) algorithm,
hackers used for figuring out how to vanquish effortlessly. Triple DES was important standard
and most used symmetric algorithm in organization (Osseiran et al., 2014).
Triple DES uses three different keys that are 56 bits each. The key length is 168 bits;
researchers would suggest that 112-bits in key quality is more similar to it.
AES
The Advanced Encryption Standard (AES) is algorithm trusted as standard by the U.S.
Government. It is used in 128-piece frame. AES uses keys of 192 and 256 bits for encryption
purposes (Sahingoz, 2014). It is used in many cases in the organization for providing security to
the data and security of the business organization.
RSA
RSA is a key encryption algorithm and standard for encrypting transmitted on Internet.
RSA is used as an asymmetric algorithm because of its uses of a couple of keys (Viani et al.,
WIRELESS NETWORKING CONCEPT
1. Worldwide Interoperability for Microwave Access (WiMax) refers to the delivery of
services to long mile wireless broadband access (Bernardos et al., 2014). It provides both
multipoint and applications. It has able to improve the network security during transmission to
last mile. WiMax uses three data encryption standards for protecting the data and information.
WiMax uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
(CCMP) to encrypt all traffic on its network (Makris, Skoutas & Skianis, 2013). The data
encryption standards used by WiMax is described as below:
Triple DES
Triple DES used to implement original Data Encryption Standard (DES) algorithm,
hackers used for figuring out how to vanquish effortlessly. Triple DES was important standard
and most used symmetric algorithm in organization (Osseiran et al., 2014).
Triple DES uses three different keys that are 56 bits each. The key length is 168 bits;
researchers would suggest that 112-bits in key quality is more similar to it.
AES
The Advanced Encryption Standard (AES) is algorithm trusted as standard by the U.S.
Government. It is used in 128-piece frame. AES uses keys of 192 and 256 bits for encryption
purposes (Sahingoz, 2014). It is used in many cases in the organization for providing security to
the data and security of the business organization.
RSA
RSA is a key encryption algorithm and standard for encrypting transmitted on Internet.
RSA is used as an asymmetric algorithm because of its uses of a couple of keys (Viani et al.,

2
WIRELESS NETWORKING CONCEPT
2013). The key is an algorithm that is use to encrypt message. There is a private key to decode it.
The limitation of RSA encryption is a data that takes aggressors a lot of time.
2. The two examples of WPAN technologies are Bluetooth and Zigbee. There are various
security challenges in the Bluetooth devices and technology. There are various attacks against
confidentiality and data integrity (Ayyash et al., 2016). Bluetooth does not provide native client
verification. The authorization of the Bluetooth device is not done that causes explicit behavior
of other connected devices. There is a huge threat of DoS attacks on the Bluetooth devices
during transmission of data and information. There can be malicious entry of external parties
during the transmission process of data and information. The sensitive data and information
might be damaged and corrupted during the wireless transmission.
Bluesnarfing is a threat to this technology that allows the attackers to increase the use of
the Bluetooth enabled devices. It looks for the IMEI number of the Bluetooth devices and get
connected through this. After connecting with the parent Bluetooth devices, the connected device
breaches all the data and information from the Bluetooth device.
Bluejacking causes data breach from the Bluetooth enabled mobile phones. The attacker
starts the bluejacking by sending false message to the mobile phones (Jiang et al., 2017). These
span messages and phishing mail causes damage to the mobile phones.
ZigBee is a wireless communication with low power and low-rate that aims to provide
cryptographic keys for security. The link between the two devices is maintained by the security
orotocol of the ZigBee. There are various physical attacks on the ZigBee radio regarding the
frequency breach (Osseiran et al., 2014). The data packets collected during the wireless
communication ca be breached.
WIRELESS NETWORKING CONCEPT
2013). The key is an algorithm that is use to encrypt message. There is a private key to decode it.
The limitation of RSA encryption is a data that takes aggressors a lot of time.
2. The two examples of WPAN technologies are Bluetooth and Zigbee. There are various
security challenges in the Bluetooth devices and technology. There are various attacks against
confidentiality and data integrity (Ayyash et al., 2016). Bluetooth does not provide native client
verification. The authorization of the Bluetooth device is not done that causes explicit behavior
of other connected devices. There is a huge threat of DoS attacks on the Bluetooth devices
during transmission of data and information. There can be malicious entry of external parties
during the transmission process of data and information. The sensitive data and information
might be damaged and corrupted during the wireless transmission.
Bluesnarfing is a threat to this technology that allows the attackers to increase the use of
the Bluetooth enabled devices. It looks for the IMEI number of the Bluetooth devices and get
connected through this. After connecting with the parent Bluetooth devices, the connected device
breaches all the data and information from the Bluetooth device.
Bluejacking causes data breach from the Bluetooth enabled mobile phones. The attacker
starts the bluejacking by sending false message to the mobile phones (Jiang et al., 2017). These
span messages and phishing mail causes damage to the mobile phones.
ZigBee is a wireless communication with low power and low-rate that aims to provide
cryptographic keys for security. The link between the two devices is maintained by the security
orotocol of the ZigBee. There are various physical attacks on the ZigBee radio regarding the
frequency breach (Osseiran et al., 2014). The data packets collected during the wireless
communication ca be breached.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
WIRELESS NETWORKING CONCEPT
3. Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor
networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016):
1041-1054.
This paper deals with the harvesting of energy in the Wireless Sensor Network (WSN).
WSN consist of large number of static sensor nodes that helps in low processing. There are
various sources of energy for the WSNs including Radio Frequency-based energy harvesting,
Solar-based energy harvesting, Thermal-based Energy Harvesting and Flow-based energy
harvesting. There are various approaches discussed in the paper for the energy harvesting. As
argued by (), the energy harvesting system might cause damage to the ecological balance of the
nature. The harvesting from different sources causes depletion of the resources in the
environment. Choochaisri, Apicharttrisorn & Intanagonwiwat, (2017) argued that log lasting
devices consumes more battery and causes energy draining. The energy-efficient reliable systems
provides benefit to the users in the form of ultra-energy efficient sensors.
Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent
advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381.
This paper discusses about the new technologies implemented in the energy-harvesting
sector. As commented by Fontes et al., (2017), the new advances in the energy harvesting have
changed the traditional scenario of energy harvesting. There are various potential model used in
recent market for energy harvesting. On the other hand, Choochaisri, Apicharttrisorn &
Intanagonwiwat, (2017) argued that the use of the modern techniques in the energy harvesting
have increases the initial cost of various energy sources and also depleting the natural resources.
Various equations and theories discussed in the paper that utilizes the traditional concept of
energy harvesting and converting it into modern technology (Osseiran et al., 2014). The possible
WIRELESS NETWORKING CONCEPT
3. Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor
networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016):
1041-1054.
This paper deals with the harvesting of energy in the Wireless Sensor Network (WSN).
WSN consist of large number of static sensor nodes that helps in low processing. There are
various sources of energy for the WSNs including Radio Frequency-based energy harvesting,
Solar-based energy harvesting, Thermal-based Energy Harvesting and Flow-based energy
harvesting. There are various approaches discussed in the paper for the energy harvesting. As
argued by (), the energy harvesting system might cause damage to the ecological balance of the
nature. The harvesting from different sources causes depletion of the resources in the
environment. Choochaisri, Apicharttrisorn & Intanagonwiwat, (2017) argued that log lasting
devices consumes more battery and causes energy draining. The energy-efficient reliable systems
provides benefit to the users in the form of ultra-energy efficient sensors.
Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent
advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381.
This paper discusses about the new technologies implemented in the energy-harvesting
sector. As commented by Fontes et al., (2017), the new advances in the energy harvesting have
changed the traditional scenario of energy harvesting. There are various potential model used in
recent market for energy harvesting. On the other hand, Choochaisri, Apicharttrisorn &
Intanagonwiwat, (2017) argued that the use of the modern techniques in the energy harvesting
have increases the initial cost of various energy sources and also depleting the natural resources.
Various equations and theories discussed in the paper that utilizes the traditional concept of
energy harvesting and converting it into modern technology (Osseiran et al., 2014). The possible
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
WIRELESS NETWORKING CONCEPT
improvement in the traditional theory has been upgraded into modern tactics. The VLSI model is
used for understanding the complexity and energy of decoding and encoding in system.
WIRELESS NETWORKING CONCEPT
improvement in the traditional theory has been upgraded into modern tactics. The VLSI model is
used for understanding the complexity and energy of decoding and encoding in system.

5
WIRELESS NETWORKING CONCEPT
References
Ayyash, M., Elgala, H., Khreishah, A., Jungnickel, V., Little, T., Shao, S., ... & Freund, R.
(2016). Coexistence of WiFi and LiFi toward 5G: Concepts, opportunities, and
challenges. IEEE Communications Magazine, 54(2), 64-71.
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zúñiga, J.
C. (2014). An architecture for software defined wireless networking. IEEE wireless
communications, 21(3), 52-61.
Choochaisri, S., Apicharttrisorn, K., & Intanagonwiwat, C. (2017). Stable Desynchronization for
Wireless Sensor Networks:(I) Concepts and Algorithms. arXiv preprint
arXiv:1704.07002.
Fontes, R. D. R., Mahfoudi, M., Dabbous, W., Turletti, T., & Rothenberg, C. (2017). How Far
Can We Go? Towards Realistic Software-Defined Wireless Networking
Experiments. The Computer Journal, 1-14.
Jiang, C., Zhang, H., Ren, Y., Han, Z., Chen, K. C., & Hanzo, L. (2017). Machine learning
paradigms for next-generation wireless networks. IEEE Wireless Communications, 24(2),
98-105.
Makris, P., Skoutas, D. N., & Skianis, C. (2013). A survey on context-aware mobile and wireless
networking: On networking and computing environments' integration. IEEE
communications surveys & tutorials, 15(1), 362-386.
WIRELESS NETWORKING CONCEPT
References
Ayyash, M., Elgala, H., Khreishah, A., Jungnickel, V., Little, T., Shao, S., ... & Freund, R.
(2016). Coexistence of WiFi and LiFi toward 5G: Concepts, opportunities, and
challenges. IEEE Communications Magazine, 54(2), 64-71.
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zúñiga, J.
C. (2014). An architecture for software defined wireless networking. IEEE wireless
communications, 21(3), 52-61.
Choochaisri, S., Apicharttrisorn, K., & Intanagonwiwat, C. (2017). Stable Desynchronization for
Wireless Sensor Networks:(I) Concepts and Algorithms. arXiv preprint
arXiv:1704.07002.
Fontes, R. D. R., Mahfoudi, M., Dabbous, W., Turletti, T., & Rothenberg, C. (2017). How Far
Can We Go? Towards Realistic Software-Defined Wireless Networking
Experiments. The Computer Journal, 1-14.
Jiang, C., Zhang, H., Ren, Y., Han, Z., Chen, K. C., & Hanzo, L. (2017). Machine learning
paradigms for next-generation wireless networks. IEEE Wireless Communications, 24(2),
98-105.
Makris, P., Skoutas, D. N., & Skianis, C. (2013). A survey on context-aware mobile and wireless
networking: On networking and computing environments' integration. IEEE
communications surveys & tutorials, 15(1), 362-386.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
WIRELESS NETWORKING CONCEPT
Osseiran, A., Boccardi, F., Braun, V., Kusume, K., Marsch, P., Maternia, M., ... & Tullberg, H.
(2014). Scenarios for 5G mobile and wireless communications: the vision of the METIS
project. IEEE Communications Magazine, 52(5), 26-35.
Sahingoz, O. K. (2014). Networking models in flying ad-hoc networks (FANETs): Concepts and
challenges. Journal of Intelligent & Robotic Systems, 74(1-2), 513.
Viani, F., Robol, F., Polo, A., Rocca, P., Oliveri, G., & Massa, A. (2013). Wireless architectures
for heterogeneous sensing in smart home applications: Concepts and real
implementation. Proceedings of the IEEE, 101(11), 2381-2396.
WIRELESS NETWORKING CONCEPT
Osseiran, A., Boccardi, F., Braun, V., Kusume, K., Marsch, P., Maternia, M., ... & Tullberg, H.
(2014). Scenarios for 5G mobile and wireless communications: the vision of the METIS
project. IEEE Communications Magazine, 52(5), 26-35.
Sahingoz, O. K. (2014). Networking models in flying ad-hoc networks (FANETs): Concepts and
challenges. Journal of Intelligent & Robotic Systems, 74(1-2), 513.
Viani, F., Robol, F., Polo, A., Rocca, P., Oliveri, G., & Massa, A. (2013). Wireless architectures
for heterogeneous sensing in smart home applications: Concepts and real
implementation. Proceedings of the IEEE, 101(11), 2381-2396.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.