Exploring Wireless Networking Concepts and Security Protocols
VerifiedAdded on 2020/04/01
|7
|1309
|50
AI Summary
The assignment provides a comprehensive overview of wireless network concepts with an emphasis on the services offered through Worldwide Interoperability for Microwave Access (WiMax). It discusses the use of three primary data encryption techniques—AES, Triple DES, and RSA—to ensure secure data transmission. Furthermore, it evaluates WPAN technologies like Bluetooth and Zigbee, addressing the security challenges they face in maintaining data integrity and confidentiality during communication.

Running head: WIRELESS NETWORKING CONCEPT
Wireless networking Concept
Name of the Student
Name of the University
Author’s Note
Wireless networking Concept
Name of the Student
Name of the University
Author’s Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
WIRELESS NETWORKING CONCEPT
1. Worldwide Interoperability for Microwave Access (WiMax) depicts the services
provided over a long distance by wireless broadband access. WiMax provides both point-to-point
and multipoint applications to different networks in the market. The applocatioms of the WiMax
hae helped in maintaining the security if the data and information over the network. The WiMax
has a secure security protocol having three data encryption technique. The three data encryption
technique has been discussed below:
AES
The Advanced Encryption Standard (AES) is an algorithm that has been approved by the
US government. It works on a degree proficient in 128-piece frame. It uses 192 and 256 bits keys
for encryption process. The purpose of the AES is to provide an advanced level of security to the
data and information in the WiMax. The use of the AES have held in maintaining the true
standard of encoding data and information in the private sector.
Triple DES
A triple DES provide original Data Encryption Standard (DES) algorithm that restricts
the hackers from vanishing the data and information in the network. The triple DES is an
important standard that helps in utilizing the symmetric algorithm in various business
organization. This encryption standard uses 56 bits each keys (Ponniah, Hu & Kumar, 2016).
The overall length of the key is 168 bits. However, various specialist suggest 112-bit key is more
similar to it.
RSA
WIRELESS NETWORKING CONCEPT
1. Worldwide Interoperability for Microwave Access (WiMax) depicts the services
provided over a long distance by wireless broadband access. WiMax provides both point-to-point
and multipoint applications to different networks in the market. The applocatioms of the WiMax
hae helped in maintaining the security if the data and information over the network. The WiMax
has a secure security protocol having three data encryption technique. The three data encryption
technique has been discussed below:
AES
The Advanced Encryption Standard (AES) is an algorithm that has been approved by the
US government. It works on a degree proficient in 128-piece frame. It uses 192 and 256 bits keys
for encryption process. The purpose of the AES is to provide an advanced level of security to the
data and information in the WiMax. The use of the AES have held in maintaining the true
standard of encoding data and information in the private sector.
Triple DES
A triple DES provide original Data Encryption Standard (DES) algorithm that restricts
the hackers from vanishing the data and information in the network. The triple DES is an
important standard that helps in utilizing the symmetric algorithm in various business
organization. This encryption standard uses 56 bits each keys (Ponniah, Hu & Kumar, 2016).
The overall length of the key is 168 bits. However, various specialist suggest 112-bit key is more
similar to it.
RSA

2
WIRELESS NETWORKING CONCEPT
RSA is an algorithm that utilizes asymmetric key encryption over the internet. The RSA
algorithm helps in encrypting and decrypting messages in the network. The plain text is
converted into cipher text that is in encrypted form.
Unlike Triple DES, RSA uses two keys for the asymmetric algorithm. The key is only known to
the receiver and transmitter that helps in providing extra security to the data and information in
the network.
2. The WPAN technologies are the advanced technologies that helps in providing smooth
transmission of data and information with proper security. The two examples of WPAN
technologies are Bluetooth and Zigbee. There are different types of challenges related to the
security of the data and information during the transmission. The attacks are against the
confidentiality and integrity of the data and information (Twitchell & Mai, 2014). Bluetooth is
not able to provide native client verification. The Bluetooth connection is not able to maintain
the explicit behavior of the connected devices. There is a huge risk of the DoS attacks in the
network. The transmission of data can be interrupted due to DoS attack in the network (Zhang et
al., 2016). The malicious entry of the malwares and viruses in the network causes data breach in
the network. The sensitive data an information is in a major risk of being corrupted by the
malicious viruses.
Zigbee is a wireless communication that consumes low power for providing low rate
cryptographic keys for security. The connection between two devices in the network initiates the
data transmission channel. There are various attacks in the Zigbee that causes huge data breach
in the network.
WIRELESS NETWORKING CONCEPT
RSA is an algorithm that utilizes asymmetric key encryption over the internet. The RSA
algorithm helps in encrypting and decrypting messages in the network. The plain text is
converted into cipher text that is in encrypted form.
Unlike Triple DES, RSA uses two keys for the asymmetric algorithm. The key is only known to
the receiver and transmitter that helps in providing extra security to the data and information in
the network.
2. The WPAN technologies are the advanced technologies that helps in providing smooth
transmission of data and information with proper security. The two examples of WPAN
technologies are Bluetooth and Zigbee. There are different types of challenges related to the
security of the data and information during the transmission. The attacks are against the
confidentiality and integrity of the data and information (Twitchell & Mai, 2014). Bluetooth is
not able to provide native client verification. The Bluetooth connection is not able to maintain
the explicit behavior of the connected devices. There is a huge risk of the DoS attacks in the
network. The transmission of data can be interrupted due to DoS attack in the network (Zhang et
al., 2016). The malicious entry of the malwares and viruses in the network causes data breach in
the network. The sensitive data an information is in a major risk of being corrupted by the
malicious viruses.
Zigbee is a wireless communication that consumes low power for providing low rate
cryptographic keys for security. The connection between two devices in the network initiates the
data transmission channel. There are various attacks in the Zigbee that causes huge data breach
in the network.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
WIRELESS NETWORKING CONCEPT
3. Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor
networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016):
1041-1054.
This paper deals with the gathering of advances in the Wireless Sensor Network (WSN).
WSN include immense number of static sensor center points those assistants in low getting
ready. There are diverse wellsprings of essentialness for the WSNs including Radio Frequency-
based imperativeness gathering, Solar-based imperativeness gathering, Thermal-based Energy
Harvesting and Flow-based essentialness procuring. There are diverse approaches discussed in
the paper for thedata collection in advances. As argued by Rao (2016), the essentialness
gathering system may causes harm to the ecological nature. The gathering from different sources
causes utilization of the benefits in the earth. Choochaisri, Apicharttrisorn and Intanagonwiwat,
(2017) fought that log persevering devices eats up more battery and causes imperativeness
exhausting.
Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent
advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381.
This paper discusses the new advances executed in the essentialness gathering division.
As commented by Fontes et al., (2017), the new advances in the imperativeness gathering have
changed the standard circumstance of essentialness procuring. Choochaisri, Apicharttrisorn and
Intanagonwiwat, (2017) argued that the use of the propelled techniques in the essentialness
gathering have grows the hidden cost of various imperativeness sources and besides depleting
the consistent resources. Diverse conditions and theories discussed in the paper that uses the
regular thought of imperativeness assembling and changing over it into current development
(Jalaian, Dasari and Motani, 2017).
WIRELESS NETWORKING CONCEPT
3. Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor
networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016):
1041-1054.
This paper deals with the gathering of advances in the Wireless Sensor Network (WSN).
WSN include immense number of static sensor center points those assistants in low getting
ready. There are diverse wellsprings of essentialness for the WSNs including Radio Frequency-
based imperativeness gathering, Solar-based imperativeness gathering, Thermal-based Energy
Harvesting and Flow-based essentialness procuring. There are diverse approaches discussed in
the paper for thedata collection in advances. As argued by Rao (2016), the essentialness
gathering system may causes harm to the ecological nature. The gathering from different sources
causes utilization of the benefits in the earth. Choochaisri, Apicharttrisorn and Intanagonwiwat,
(2017) fought that log persevering devices eats up more battery and causes imperativeness
exhausting.
Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent
advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381.
This paper discusses the new advances executed in the essentialness gathering division.
As commented by Fontes et al., (2017), the new advances in the imperativeness gathering have
changed the standard circumstance of essentialness procuring. Choochaisri, Apicharttrisorn and
Intanagonwiwat, (2017) argued that the use of the propelled techniques in the essentialness
gathering have grows the hidden cost of various imperativeness sources and besides depleting
the consistent resources. Diverse conditions and theories discussed in the paper that uses the
regular thought of imperativeness assembling and changing over it into current development
(Jalaian, Dasari and Motani, 2017).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
WIRELESS NETWORKING CONCEPT
WIRELESS NETWORKING CONCEPT

5
WIRELESS NETWORKING CONCEPT
References
Choochaisri, S., Apicharttrisorn, K., & Intanagonwiwat, C. (2017). Stable Desynchronization for
Wireless Sensor Networks:(I) Concepts and Algorithms. arXiv preprint
arXiv:1704.07002.
Fontes, R. D. R., Mahfoudi, M., Dabbous, W., Turletti, T., & Rothenberg, C. (2017). How Far
Can We Go? Towards Realistic Software-Defined Wireless Networking
Experiments. The Computer Journal, 1-14.
Jalaian, B., Dasari, V., & Motani, M. (2017, January). A generalized optimization framework for
control plane in tactical wireless networking. In Computing, Networking and
Communications (ICNC), 2017 International Conference on (pp. 986-990). IEEE.
Manchala, D. (2016). Wireless Networking Technologies in the Contexts of Energy Efficiency
and Internet Interoperability.
Ponniah, J., Hu, Y. C., & Kumar, P. R. (2016). A System-Theoretic Clean Slate Approach to
Provably Secure Ad-Hoc Wireless Networking. IEEE Transactions on Control of
Network Systems, 3(2), 206-217.
Qiu, C., Tian, T., Song, Q., Zhao, C., & Xu, F. (2016, September). Multiple controllers sleeping
management in green software defined wireless networking. In Communications and
Information Technologies (ISCIT), 2016 16th International Symposium on (pp. 525-530).
IEEE.
Rao, B. S. (2016). With Improvised Transmission Opportunities Scheduling in Sub Channels in
Multiple Hop Wireless Networking. International Journal of Engineering Science, 7329.
WIRELESS NETWORKING CONCEPT
References
Choochaisri, S., Apicharttrisorn, K., & Intanagonwiwat, C. (2017). Stable Desynchronization for
Wireless Sensor Networks:(I) Concepts and Algorithms. arXiv preprint
arXiv:1704.07002.
Fontes, R. D. R., Mahfoudi, M., Dabbous, W., Turletti, T., & Rothenberg, C. (2017). How Far
Can We Go? Towards Realistic Software-Defined Wireless Networking
Experiments. The Computer Journal, 1-14.
Jalaian, B., Dasari, V., & Motani, M. (2017, January). A generalized optimization framework for
control plane in tactical wireless networking. In Computing, Networking and
Communications (ICNC), 2017 International Conference on (pp. 986-990). IEEE.
Manchala, D. (2016). Wireless Networking Technologies in the Contexts of Energy Efficiency
and Internet Interoperability.
Ponniah, J., Hu, Y. C., & Kumar, P. R. (2016). A System-Theoretic Clean Slate Approach to
Provably Secure Ad-Hoc Wireless Networking. IEEE Transactions on Control of
Network Systems, 3(2), 206-217.
Qiu, C., Tian, T., Song, Q., Zhao, C., & Xu, F. (2016, September). Multiple controllers sleeping
management in green software defined wireless networking. In Communications and
Information Technologies (ISCIT), 2016 16th International Symposium on (pp. 525-530).
IEEE.
Rao, B. S. (2016). With Improvised Transmission Opportunities Scheduling in Sub Channels in
Multiple Hop Wireless Networking. International Journal of Engineering Science, 7329.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
WIRELESS NETWORKING CONCEPT
Rawat, D. B., & Reddy, S. (2016, March). Recent advances on software defined wireless
networking. In SoutheastCon, 2016 (pp. 1-8). IEEE.
Twitchell Jr, R. W., & Mai, K. (2016). U.S. Patent No. 9,295,099. Washington, DC: U.S. Patent
and Trademark Office.
Zhang, H., Wang, L. Y., Yin, G., Li, S. E., Li, K., Hua, J., ... & Jin, H. (2016). Trustworthy
Foundation for CAVs in an Uncertain World: From Wireless Networking, Sensing, and
Control to Software-Defined Infrastructure. In Road Vehicle Automation 3 (pp. 211-223).
Springer International Publishing.
WIRELESS NETWORKING CONCEPT
Rawat, D. B., & Reddy, S. (2016, March). Recent advances on software defined wireless
networking. In SoutheastCon, 2016 (pp. 1-8). IEEE.
Twitchell Jr, R. W., & Mai, K. (2016). U.S. Patent No. 9,295,099. Washington, DC: U.S. Patent
and Trademark Office.
Zhang, H., Wang, L. Y., Yin, G., Li, S. E., Li, K., Hua, J., ... & Jin, H. (2016). Trustworthy
Foundation for CAVs in an Uncertain World: From Wireless Networking, Sensing, and
Control to Software-Defined Infrastructure. In Road Vehicle Automation 3 (pp. 211-223).
Springer International Publishing.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.