MN603 - Wireless Networks and Security: Technology & Standards Report

Verified

Added on  2023/06/12

|8
|2312
|88
Report
AI Summary
This report provides a detailed evaluation of wireless network technologies and security, focusing on a comparison of technologies like satellite, WiMax, and Wi-Fi across factors such as communication spectrum, modulation techniques, medium access control, and network topologies. It further assesses various wireless communication standards including UHF RFID, NFC, ZigBee, Z-Wave, Bluetooth, cellular systems, IEEE 802.11P, and Low Power Wide Area Networks (LPWAN) in the context of cyber-physical systems and the Internet of Things (IoT). The report concludes by justifying UHF RFID as the standard offering the best network performance for cyber-physical systems and IoT due to its higher frequency range and availability, highlighting the importance of wireless networks in modern communication and enterprise infrastructure.
Document Page
Running head: WIRELESS NETWORKS AND SECURITY
Wireless Network and Security
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
WIRELESS NETWORKS AND SECURITY
Introduction
Wireless network can be defined as the specific computer network, which eventually utilizes
the wireless data connections within the nodes of network. The methods through which all types of
telecommunications networks or business installations substantially avoid the expensive procedure
to introduce cables to any building are known as wireless networking [4]. The connection is very easy
with the help of this wireless network; moreover, the entire process of implementation is extremely
simple and easy. Wireless networking is implemented as well as administrated with the help of radio
communication.
The following report outlines a brief discussion on the concept of wireless networking
technologies and their securities. Three specific parts will be covered here. They are the comparison
between the technologies in respect to four factors, evaluation of six wireless communication
standards for the systems of IoT and cyber physical and the final part is the justification of the best
network performance.
Discussion
1. Comparison of Wireless Communication Technologies
There are several technologies in wireless communications. The most significant
technologies of the wireless communications are satellite, WiMax or Worldwide Interoperability for
Microwave Access and Wireless Fidelity or Wi-Fi. All the three above mentioned technologies are
extremely popular and effective and are accepted by various users all over the world [11]. The
detailed comparison of these three technologies in respect to the communication spectrum,
modulation techniques, medium access control or MAC and network topologies are as follows:
Key Factors Satellite
Technology
WiMax Wireless Fidelity
i) Communication
Spectrum
The communication
spectrum of
satellite wireless
technology is 12 to
18 GHz for the Ku
band.
The
communication
spectrum of WiMax
is different in
various places [3].
The most
commonly utilized
frequencies are 3.5
The communication spectrum
of Wireless Fidelity or Wi-Fi is
different for various variants.
The variants are 802.11a,
802.11b, 802.11g, 802.11n,
802.11ac, 802.11ad, 802.11af
and 802.11ah [9]. The
frequency bands for these
Document Page
2
WIRELESS NETWORKS AND SECURITY
GHz and 5.8 GHZ
for the standard of
802.16d and 2.3
GHz, 2.5 GHz and
3.5 GHz for the
standard of
802.16e.
variants are 5 GHz, 2.4 GHz,
2.4 GHZ, 2.4 GHZ and 5 GHZ,
below 6 GHz, up to 60 GHz,
below 1 GHz and 700 MHz,
860 MHz, 902 MHz
respectively for the variants
[6].
ii) Modulation
Techniques
The modulation
technique for
satellite
communication is
Phase Shift Keying
or PSK.
The modulation
techniques for
WiMax are BPSK,
QPSK, 16 QAM and
64 QAM.
The modulation techniques
for wireless fidelity are
complementary coded keying
or CCK and Quadrature Phase
Shift Keying or QPSK.
iii) Medium Access
Control Mechanism
The MAC protocols
of satellite
communication are
time division
multiple access or
TDMA and
frequency division
multiple access or
FDMA [2].
The MAC
mechanism of
WiMax has to fulfil
various
requirements like
connection
orientation,
supporting
communication to
all and point to
multipoint
connection. The
main tasks are data
transmission and
data reception.
The Wi-fi MAC protocol is the
specific underlying
technology of WLAN that is
based on the specifications of
IEEE 802.11, providing data
link layer of Ethernet LAN
system [12].
iv) Network
Topologies
The network
topology of the
satellite is point to
point and point to
multi point
topology, switched
The network
topologies of
WiMax
communication are
mesh topology and
black haul
The network topologies of
Wi-Fi communication are
mainly AP based topology,
peer to peer topology and
point to multipoint bridge
topology [7].
Document Page
3
WIRELESS NETWORKS AND SECURITY
topology, TDMA
and hybrid
topology.
topology.
2. Evaluation of Wireless Communication Standards
The evaluation of the wireless communication standards in respect to the cyber physical
systems and internet of things is given below:
a) UHF RFID and NFC: The ultra high frequency band of radio frequency identification device
mainly covers a range from 300 MHz to 3 GHz. This RFID is extremely effective and powerful in
respect to the other frequencies as the frequency bandwidth is much higher than the rest [5]. The
range of reading of the passive UHF systems could be up to 12m and also provides the faster rate of
data transfer than HF and LF. Moreover, this particular RFID even supports multiple tag reading. As
the frequency is higher than others, it is extremely effective for internet of things.
NFC or Near-field communication is the respective collection of communication protocols,
which allow any two electronic devices to communicate amongst each other. One of the devices is
any portable device like smart phone [1]. This is done by bringing these two devices closer to each
other within 4 cm of distance. Any NFC device could work in three distinct modes, which are NFC
card emulation, NFC reader or writer and NFC peer to peer.
b) ZigBee and Z-Wave: ZigBee protocol is the specification of IEEE 802.15 for the higher level
communication protocols. It is utilized for the creation of personal area networks or PAN with the
smaller and lower power digital radios. The main advantage of this protocol is that it is extremely
cost effective than the other technologies like Bluetooth or Wi-Fi [5]. Cyber physical systems or CPS
are the integrations for computing, networking as well as physical procedures. ZigBee technology
helps to create the PAN for the CPS.
Z-Wave is the protocol of wireless communication that is utilized mainly for the home
automation. It is the specific mesh network that utilizes lower energy radio waves for the purpose of
communicating from various appliances and thus allowing wireless control for the users. The
frequency range is 800 MHz to 900 MHz. Since, the range is short, it is not effective in the IoT in
compared to others.
c) Bluetooth and Bluetooth Low Energy: Bluetooth is the wireless technology that is made
for the purpose of data exchange within shorter distances [12]. The wavelength is from 2.40 GHz to
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
WIRELESS NETWORKS AND SECURITY
2.485 GHz. This technology is utilized from the mobile or laptop devices for building personal area
networks or PANS. The only disadvantage of this technology is that the coverage area is very low in
comparison to Wi-Fi and hence many people do not want to utilize this.
Bluetooth Low Energy is the wireless technology for personal area network that is designed
as well as marketed by the Bluetooth SIG. the most significant applications of this particular
technology are security, healthcare, fitness, home entertainment and many more. Various operating
systems like iOS, Windows, Linux and Android support this technology [9]. The power consumption is
extremely less in this technology. This particular technology is expected to become effective for IoT
and cyber physical systems in the near future.
d) Cellular Systems: The cellular system is the specific communication network, whose last
link is completely wireless. This network is eventually distributed over the land areas, which are
known as cells and hence the name is given. Several sets of frequencies are being utilized within the
cellular networks for avoiding interference and thus providing good service [10]. It has more capacity
than the single larger transmitter and the coverage area is larger.
e) IEEE 802.11P: It is the approved amendment within the standard of IEEE 802.11 to the
WAVE or wireless access in vehicular environments. It is defined as the enhancements of the 802.11
and is required for supporting ITS or Intelligent Transportation Systems application. The data
exchange is extremely fast and the frequency band is 5.9 GHz [4]. The time reference that is defined
within the IEEE 802.11p is UTC. The channels that are utilized within the IEEE 802.11p is of 10 MHz
bandwidth and it is half the bandwidth or is double the time of transmission for any particular data
symbol. This particular protocol thus can be evaluated on the cyber physical systems and IoT.
f) Low Power Wide Area Networks: LPWAN or low power wide area network is the specific
type of wireless telecommunication WAN that is eventually designed for allowing longer range of
communications at an extremely lower bit rate. This type of technology carries more data and is
extremely efficient. The data rate of LPWAN solely ranges within 0.3 Kbit/s to 50 kbit/s in one
channel [5]. This technology is utilized for the creation of any private wireless sensor network.
LPWAN technologies enable connection for the Internet of Things. Two technologies are present.
They are 3GPP standardized solutions and non-standardized solutions. Moreover, it is utilized to
reduce the cyber crime.
3. Wireless Network Performance
On the evaluation of the wireless communication standards for cyber physical systems and
internet of things, the standard that would produce the best network performance is UHF RFID. This
Document Page
5
WIRELESS NETWORKS AND SECURITY
is because the frequency range is extremely higher than the rest and hence it could be easily utilized
in cyber physical systems and internet of things [2]. As it is new, the availability is much higher than
the rest.
Conclusion
Therefore, from the above discussion, it can be concluded that wireless networks are certain
computer networks, which are not linked with the help of any cable. The utilization of the wireless
network solely allows the enterprises in avoiding costly process for implementing cables within a
building for the purpose of connections. The implementation of the wireless networks always takes
place within the physical layer of the OSI model. The main types of the wireless network are LAN,
WAN, MAN and PAN. There are various technologies of wireless networking. These technologies are
well accepted by all users and in various organizations. The above report has provided the detailed
description on the wireless networking concept and its security. The technologies are being
compared with other and the comparison is provided here. Moreover, the wireless communication
standards are also evaluated and the best network is selected on the basis of the performances of
the networks.
Document Page
6
WIRELESS NETWORKS AND SECURITY
References
[1] Andrews, Jeffrey G., Xinchen Zhang, Gregory D. Durgin, and Abhishek K. Gupta. "Are we
approaching the fundamental limits of wireless network densification?." IEEE Communications
Magazine 54, no. 10 (2016): 184-190.
[2] Dey, Kakan Chandra, Anjan Rayamajhi, Mashrur Chowdhury, Parth Bhavsar, and James Martin.
"Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous
wireless network–Performance evaluation." Transportation Research Part C: Emerging
Technologies 68 (2016): 168-184.
[3] Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC
press, 2016.
[4] Zhao, Nan, F. Richard Yu, Ming Li, Qiao Yan, and Victor CM Leung. "Physical layer security issues
in interference-alignment-based wireless networks." IEEE Communications Magazine 54, no. 8
(2016): 162-168.
[5] Xiao, Yang, ed. Security in sensor networks. CRC Press, 2016.
[6] Chen, Yuang, and Thomas Kunz. "Performance evaluation of IoT protocols under a constrained
wireless access network." In Selected Topics in Mobile & Wireless Networking (MoWNeT), 2016
International Conference on, pp. 1-7. IEEE, 2016.
[7] Zhou, Xiangyun, Yan Zhang, and Lingyang Song. Physical layer security in wireless
communications. Crc Press, 2016.
[8] Liyanage, Madhusanka, Ahmed Bux Abro, Mika Ylianttila, and Andrei Gurtov. "Opportunities and
challenges of software-defined mobile networks in network security." IEEE Security & Privacy 14, no.
4 (2016): 34-44.
[9] Shin, Seungwon, Lei Xu, Sungmin Hong, and Guofei Gu. "Enhancing network security through
software defined networking (SDN)." In Computer Communication and Networks (ICCCN), 2016 25th
International Conference on, pp. 1-9. IEEE, 2016.
[10] He, Debiao, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. "Anonymous authentication
for wireless body area networks with provable security." IEEE Systems Journal 11, no. 4 (2017): 2590-
2601.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
WIRELESS NETWORKS AND SECURITY
[11] Sarkar, Subir Kumar, T. G. Basavaraju, and C. Puttamadappa. Ad hoc mobile wireless networks:
principles, protocols, and applications. CRC Press, 2016.
[12] Mahgoub, Imad, and Mohammad Ilyas. Sensor network protocols. CRC press, 2016.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]