Wireless Networking Concepts Report: Security, Energy, and Protocols

Verified

Added on  2020/04/01

|11
|2764
|62
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: WIRELESS NETWORKING CONCEPTS
Wireless Networking Concepts
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
WIRELESS NETWORKING CONCEPTS
Table of Contents
1. Comparison of three data encryption standards for WiMAX network............................2
2. Security Challenges on WPAN technologies..................................................................3
3. Critical Reflection on Energy Harvest.............................................................................4
References............................................................................................................................7
Document Page
2
WIRELESS NETWORKING CONCEPTS
1. Comparison of three data encryption standards for WiMAX network
The protocol that can be used for the encryption and security of the network. This would
result in decreasing the frequency of unauthorized access of the points in the network (Rawal,
2016). Different type of encryptions is used for the security of the network and different type of
encryption models and techniques are used for the network and also reduces the risk of external
intrusion within the system. The different type of risks that are involved with the networks are
DDos and the Dos Attacks in the network.
The DES was applied for the first time during the implementation of Lucifer which was
created by IBM although the system had different type of down sides and it made use of very
primitive type of encryption strategies and hence the instruction by the attackers became more
and more prominent. This system was vulnerable and could have been cracked very easily. For
the expansion of security, the three DES has been used (Mahmood, Javaid & Razzaq, 2015).
This 3DES is a symmetric key piece figure which utilizes the Data Encryption Algorithm three
times for a specific square of information. The key size of figure of the Data Encryption
Algorithm is 56 bit. In any case, expanding measure of computational power made the DES
security in danger. The key size of the 3DES is expanded to make the DES encryption standard
more secure to give assurance against every one of the information security assault by changing
the information into another piece of information. The different type of data encryption used in
the DES system are AES and Blowfish and these systems can be connected with the WiMAX
system very easily.
There are two types of key namely symmetric and asymmetric that can be useful for the
encryption of the plaintext to the cipher content and the decryption of the cipher text to the plain
Document Page
3
WIRELESS NETWORKING CONCEPTS
text (Kinnunen et al., 2016). (Movassaghi et al., 2014). The symmetric key encryption are
utilized for the system as they can be implemented very easily and they have very simple process
for implantation. Two type of keys are generated in this encryption technique are private key and
public key. Only the authenticated users would be able to access the content that is encrypted
with the private keys, but the contents that are encrypted with the public keys can very easily be
ciphered by all the other users in the network.
2. Security Challenges on WPAN technologies
The main security challenges for the WPAN technologies are that they might be
vulnerable to several type of attacks if they are left unattended for a longer period of time (Lu et
al., 2015). The various type of examples of the WPAN are Bluetooth and Zibee. The security test
of Zigbee or Z-Wave is that the signs of the Zigbee or Z-wave are not straightforwardly perfect
with figuring gadgets of standard like tablet, portable PC and advanced mobile phone. The Hue
knobs work in this procedure. Every one of the lights and globules of the house that are
mechanized are associated with Zigbee center point which interfaces with Internet switch. The
movement sensors or the globules are expected to speak with center which is associated with the
Wi-Fi or the home system or by means of Ethernet link that is connected to the Internet switch.
Zigbee or Z-wave is not perfect with each other which make a security challenge for the
gadget .Zigbee and Z-wave are risen together so they are associated with the use of the
telephones or tablets (Liu et al., 2016). The Bluetooth hacking is known as Bluesnarfing. The
reason that lies behind Bluesnarfing is that the path in which Bluetooth is executed on telephones
and tablets. On account of Bluesnarfing, the procedure of question trade convention (OBEX) is
actualized. Another procedure of Bluetooth hacking is the secondary passage hacking. This
secondary passage hacking happens where the gadget is not trusted any longer and the cell phone
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
WIRELESS NETWORKING CONCEPTS
is gotten to by programmers. This additionally accesses the information with Bluesnarfing and
utilizations administrations like Wireless Personal Area Network. Another procedure to hack
Bluetooth is Bluebugging. There is various type of model that are available for the mitigation of
the network (He et al., 2013). The wireless network can be deployed for dispatching the packets
and the reception of the packets in the WiMAX network (Kinnunen et al., 2016).
For the remote users of the network individual the network security for the WiMax
system is utilized for the verification, protection security and approval of the project (Naderi,
Nintanavongsa & Chowdhury, 2014). The nature of the system and also the availability of the
system is to accessed so that the safety of the remote system can be improved to a great extent.
For the accessibility to the network various type of procedures can be utilized. The phones can
eb connected to the remote system very easily and also the devices that are used by the users to
get associated with the network should also should be configured accordingly (Pierobon et al.,
2014) (Rawat et al., 2014).
3. Critical Reflection on Energy Harvest
Shaikh, F. K., & Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A
comprehensive review. Renewable and Sustainable Energy Reviews, 55, 1041-1054.
In the present times the wireless devices are being used for the connection to the wireless
network and the IOT devices are being used along with the wireless sensors for being associated
with the system (Shaikh & Zeadally, 2016). As of late, Wireless Sensor Networks (WSNs) have
pulled in parcel of consideration because of their inescapable nature and their wide arrangement
in Internet of Things, Cyber Physical Systems, and other developing territories. The restricted
vitality related with WSNs is a noteworthy bottleneck of WSN advances. To conquer this
Document Page
5
WIRELESS NETWORKING CONCEPTS
significant constraint, the outline and advancement of proficient and elite vitality reaping
frameworks for WSN situations are being investigated (Shaikh & Zeadally, 2016). We show a
far reaching scientific categorization of the different vitality reaping sources that can be utilized
by WSNs. We likewise examine different as of late proposed vitality expectation models that can
possibly augment the vitality gathered in WSNs. At long last, we distinguish a portion of the
difficulties that still should be routed to create financially savvy, proficient, and dependable
vitality gathering frameworks for the WSN condition. Different types of energy models are
applied in the network for improving the performances of the network (Shaikh & Zeadally,
2016). The way toward giving vitality persistently and putting away the vitality for some time
later is finished by vitality collecting. The hubs of remote sensor arrange with the goal that they
can keep going forever are empowered by vitality reaping frameworks. Different type of energy
sources is also used in the harvesting models for the increase of the energy and also for storing
the energy so that they can be used in the future (Shaikh & Zeadally, 2016). The risk involved
with the different type of models are used for the analysis of the model of harvesting and the
different use of the applications of the wireless sensor network. This also is very effective in
reducing the risk of disruption of the supply of energy that takes place due to the power faults
(Shaikh & Zeadally, 2016). The capacitors for the system store the electricity in the electrostatic
form and the storage of the energy is done in the photovoltaic cells so that the stored energy can
be very easily used during the time of harvest.
Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., & Huang, K.
(2015). Energy harvesting wireless communications: A review of recent advances. IEEE
Journal on Selected Areas in Communications, 33(3), 360-381.
Document Page
6
WIRELESS NETWORKING CONCEPTS
This paper is involved with the discussions about the areas of communication (Ulukus et
al., 2015). The different type of wireless networks is being compared and also contrasted in this
paper that are related to the harvesting technique in the wireless network sensors (Ulukus et al.,
2015). There are for the most part two sorts of vitality collecting frameworks: vitality reaping
that is done from the encompassing sources which incorporates radio recurrence based vitality
gathering which includes RFID recurrence for its application, sun oriented based vitality reaping
which includes sunlight based vitality putting away for its future utilize, warm based vitality
collecting includes vitality that originate from the warm wellspring of vitality and stream based
vitality gathering are vitality that originates from the rotors and turbines; and the outer based
vitality collecting are mechanical based and human based vitality reaping. The author provides
the discussion about the sources of different type of sustainable energy sources for the
consumption of power by the different type of IoT devices (Ulukus et al., 2015). For the
obligation control operation, the control systems can be connected and programmed turning off
of the gadget amid not being used is required to be connected for lessening the power utilization
of the remote sensor gadgets associated in the system (Ulukus et al., 2015). As associations
develop, so does the blend of rigging depending on uninterruptible power supply (UPS) units,
which are fundamental to keeping frameworks working through lightning strikes, storms and
other power disturbances. The main solutions to this type of problems are to conduct regular
audit of the systems that are highlighted here (Ulukus et al., 2015). In addition to this a system
for periodic review of the systems should also be conducted here. The connected nodes in the
network can be kept in low power mode so that there is an improvement in the transmission
speed and reduces the risk of the power being lost due to the inactivity of the nodes (Ulukus et
al., 2015). Programming sellers might be continually discharging fixes and overhauls into the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
WIRELESS NETWORKING CONCEPTS
commercial center, yet associations are not really anxious to apply them. Some let others possess
the update forefronts and bear potential take off hiccups, at that point take after along at a
sheltered interim. This procedure separates deplorably when an association endures a blackout
that would have been kept away from with a fix that it willfully delayed. The solution for this
type of problem involves the verification of the redundancy of the system and also management
of the proactive upgrades for the system. Various other strategies can also be used for the
solution to this type of faults. The leakage of the resources and the different type of solution for
them is considered here in this paper.
Document Page
8
WIRELESS NETWORKING CONCEPTS
References
He, S., Chen, J., Jiang, F., Yau, D. K., Xing, G., & Sun, Y. (2013). Energy provisioning in
wireless rechargeable sensor networks. IEEE Transactions on Mobile Computing, 12(10),
1931-1942.
Kamalinejad, P., Mahapatra, C., Sheng, Z., Mirabbasi, S., Leung, V. C., & Guan, Y. L. (2015).
Wireless energy harvesting for the internet of things. IEEE Communications Magazine,
53(6), 102-108.
Kang, J., Yu, R., Maharjan, S., Zhang, Y., Huang, X., Xie, S., ... & Gjessing, S. (2015). Toward
secure energy harvesting cooperative networks. IEEE Communications Magazine, 53(8),
114-121.
Kinnunen, S. K., Ylä-Kujala, A., Marttonen-Arola, S., Kärri, T., & Baglee, D. (2016, January).
Internet of Things Technologies to Rationalize the Data Acquisition in Industrial Asset
Management. In Proceedings of the International Conference on Data Mining (DMIN) (p.
73). The Steering Committee of The World Congress in Computer Science, Computer
Engineering and Applied Computing (WorldComp).
Liu, Y., Mousavifar, S. A., Deng, Y., Leung, C., & Elkashlan, M. (2016). Wireless energy
harvesting in a cognitive relay network. IEEE Transactions on Wireless Communications,
15(4), 2498-2508.
Lu, X., Wang, P., Niyato, D., & Han, Z. (2015). Resource allocation in wireless networks with
RF energy harvesting and transfer. IEEE Network, 29(6), 68-75.
Document Page
9
WIRELESS NETWORKING CONCEPTS
Mahmood, A., Javaid, N., & Razzaq, S. (2015). A review of wireless communications for smart
grid. Renewable and sustainable energy reviews, 41, 248-260.
Miroshnik, M. A., & Kovalenko, M. A. (2013). Uses of programmable logic integrated circuits
for implementations of data encryption standard and its experimental linear cryptanalysis.
Iнформацiйно-керуючi системи на залiзничному транспортi, (6), 36-44.
Mishra, D., De, S., Jana, S., Basagni, S., Chowdhury, K., & Heinzelman, W. (2015). Smart RF
energy harvesting communications: Challenges and opportunities. IEEE Communications
Magazine, 53(4), 70-78.
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., & Jamalipour, A. (2014). Wireless body
area networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1658-1686.
Naderi, M. Y., Nintanavongsa, P., & Chowdhury, K. R. (2014). RF-MAC: A medium access
control protocol for re-chargeable sensor networks powered by wireless energy
harvesting. IEEE Transactions on Wireless Communications, 13(7), 3926-3937.
Pierobon, M., Jornet, J. M., Akkari, N., Almasri, S., & Akyildiz, I. F. (2014). A routing
framework for energy harvesting wireless nanosensor networks in the Terahertz Band.
Wireless networks, 20(5), 1169-1183.
Rawal, S. (2016). Advanced Encryption Standard (AES) and It’s Working.
Rawat, P., Singh, K. D., Chaouchi, H., & Bonnin, J. M. (2014). Wireless sensor networks: a
survey on recent developments and potential synergies. The Journal of supercomputing,
68(1), 1-48.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
WIRELESS NETWORKING CONCEPTS
Shaikh, F. K., & Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A
comprehensive review. Renewable and Sustainable Energy Reviews, 55, 1041-1054.
Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., & Huang, K. (2015).
Energy harvesting wireless communications: A review of recent advances. IEEE Journal
on Selected Areas in Communications, 33(3), 360-381.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]