country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Data Encryption Standards For Wimax

tag 0 Download7 Pages / 1,671 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Data Encryption Standards For Wimax.
 
 

Answer:

Comparison of data encryption standards for WiMAX

WiMAX or Worldwide Interoperability for Microwave Access is a coalition of the wireless industry for the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks. WiMAX (Pareit et al., 2012) is commonly known as 4G network and is a wireless wide area network (WAN) that can cover the area same as DSL lines but without wires. 3DES (Data Encryption Standard) (Singh, 2013) and AES (Advanced encryption standard) (Ahmad & Ismail, 2016) is used by WiMAX to encrypt the data transferred on the network. The 3DES uses three different keys to encrypt the data. Each data is of the length of 56-bits each. In some software’s the performance becomes slow due to the use of this three keys. The 3DES is becoming obsolete due to its slow performance and the limit of length of the keys. Advanced Encryption Standard (Rewagad & Pawar, 2013) is the main tool used for encryption in WiMAX technology. Encryption key of 128-bit, 192-bit and 256-bit is supported by the advanced encryption standard. AES is a popular algorithm which was built from CCMP. 3DES is much slower than AES. Advanced Encryption standard is much more easy to implement and a very little memory is used. However, AES does not require dedicated processors on board the BS, and m their might be a risk of not being used by all end-user terminals. Initially this helps in considering the fact that 3DES still remains a vital encryption tool on the WiMAX (Dadhich, Narang & Yadav 2012) network in spite of the presence of advanced encryption standard.

Security challenges faced by WAPN technology:

The most common WAPN technology are the Bluetooth and the ZigBee network. Both this technology faces the same difficulty as that of the security issues faced by the wireless technology.

Security challenges faced by Bluetooth technology are listed below:

  • Eavesdropping – This is a process by which an attacker can sniff into the air of Bluetooth transmission and exploit the right vulnerabilities, read or listen to the data (Saliou et al.). That means someone is conversing using a Bluetooth headset then someone can potentially listen to it.
  • Bluesnarfing – This is a process in which an attacker can pair to a device and once devices are paired, access and steal information from the Bluetooth device becomes very easy. The pairing is usually done without the knowledge of the user, which possibly results in stolen contact information, photos, videos, calendar events, and more (Ketari & Khanum, 2012).
  • Blue bugging- An attacker can easily remote control the various aspects of the user’s device. Sending of outgoing calls and texts, forwarding of incoming calls and texts, change of settings, and watching of screens and keypresses and many other things (Rawat & Bhattacharya, 2016).
  • Denial of service –in this process an attacker can put unwanted stuffs in the user’s device, block the communications, drain the battery of the device, or even crashes the device.
 

Security challenges faced by ZigBee technology:

  • Sniffing: there are many networks which do not use proper encryption as a result the attackers take advantage to sniff all the communications with the proper use equipment’s. in this attack all the information from a network is collected, which is possible in a network which implements the standard generic security level protocols for communication (Olawumi et al., 2014).
  • Replay attack: Recording of the approved traffic on a network by the attacker is done in this type of attack and paly it later which causes a malicious effect. This attacks are straight forward for ZigBee’s which do not implement a do not implement any encryption for the communication (Vidgren et al., 2013).
  • Physical Attacks: This attacks are most common which involves the interfering of ZigBee devices by locating it. Hard coded encryption keys which are loaded in the RAM are often employed by radios operating in the ZigBee network once the device is powered.as the devices in the network are disturbed and flashed so there remains a possibility of replacing the keys becomes less and having known the issues the attackers can set up special serial interfaces in order to intercept the encryption key in the ZigBee device when the power rises from flash to RAM (Ramsey, Mullins & White, 2012).
  • Denial of Service-This is an another method along with the one mentioned above which makes the ZigBee network unsafe. Signal jamming, reflexive jamming, maximization of frame counter are some other problems faced by the network (Bahl, Sharma & Verma, 2012).

Paper Review: Energy Harvesting

Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016): 1041-1054.

This article discusses about the energy harvesting techniques used in daily lives. Harvesting of energy is one of the emerging technology related to applications on indoor and outdoor environment. The demands for energy harvesting as increasing with the advancement of microelectronics and MEMS. This rep article also discusses about the problems and applications of energy harvesting. This has gained the attention of various stallholders which involves designs and implementation of this technology to face the energy demands of future wireless sensor networks. Moreover, this article focuses on the techniques required to meet the future energy demands of the WSNs. Specifically, this focuses on the classifications of the schemes used on energy harvesting techniques in WSNs. The article has thoroughly reviewed the classes and sub classes of energy harvesting techniques and the harvester mechanism along with the efficiency of the harvester. For each category the harvester hardware system has different design and has different harvesting capabilities. The different designs of the harvester determine the efficiency of the harvester. A survey has been conducted on various models aimed to predict the future energy cycles. The survey has proved that only few predictions technique has been used still far to in the area of modeling which states that the state-of-the-art is still immature. Addressing of several open research challenges still need to be done in the future which includes the need to focus on the miniaturized generic harvesters. This can later be used in different environments with energy sources that are dynamic. Major reason for deploying energy harvesting technique is due to the major problem faced by WSN regarding energy. In cases if the energy the sensor nodes depletes then the role is no longer played, unless and until a new source of energy is used or no other harvesting technique hasn’t been introduced to fulfill the energy gap.

Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381. 4.

This article summarizes the application of energy harvesting in a broad area of wireless communication network. This article has covered a variety of topics which includes the information-theoretical and physical layer of performance limit to the scheduling policies and medium access control protocol. This article also discusses about the emerging model of energy transfer and cooperation that occurs with the information transfer of the wireless network. The article has also presented a model of total energy consumption. The threats faced by energy harvesting from physical and practical concerns has made this technique face new challenges. Taking practical conditions mathematical formulas are designed which increases the set of possibilities. The discussion of the energy and information transfer provides exciting possibilities that can be adapted in the future to adapt the network operations with improved performance.

 

References:

Ahmad, R., & Ismail, W. (2016). Performance Comparison of Advanced Encryption Standard-128 Algorithms for WIMAX Application with Improved Power-Throughput. Journal of Engineering Science and Technology, 11(12), 1-17.

Bahl, N., Sharma, A. K., & Verma, H. K. (2012). On Denial of Service Attacks for Wireless Sensor Networks. SYSTEM, 17, 18.

Dadhich, R., Narang, G., & Yadav, D. M. (2012). Analysis and Literature Review of IEEE 802.16 e (Mobile WiMAX) Security. International Journal of Engineering and Advanced Technology, 1, 167-173.

Ketari, L., & Khanum, M. A. (2012). A review of malicious code detection techniques for mobile devices. International Journal of Computer Theory and Engineering, 4(2), 212.

Olawumi, O., Haataja, K., Asikainen, M., Vidgren, N., & Toivanen, P. (2014, December). Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned. In Hybrid Intelligent Systems (HIS), 2014 14th International Conference on (pp. 199-206). IEEE.

Pareit, D., Lannoo, B., Moerman, I., & Demeester, P. (2012). The History of WiMAX: A Complete Survey of the Evolution in Certification and Standardization for IEEE 802.16 and WiMAX. IEEE Communications Surveys and Tutorials, 14(4), 1183-1211.

Ramsey, B. W., Mullins, B. E., & White, E. D. (2012, October). Improved tools for indoor ZigBee warwalking. In Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on (pp. 921-924). IEEE.

Rawat, D. B., & Bhattacharya, S. (2016). Wireless Body Area Network for Healthcare Applications. In Advanced Methods for Complex Network Analysis (pp. 343-358). IGI Global.

Rewagad, P., & Pawar, Y. (2013, April). Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. In Communication Systems and Network Technologies (CSNT), 2013 International Conference on (pp. 437-439). IEEE.

Saliou, D. A., Al-Khateeb, W. F. M., Olanrewaju, R. F., & Fatai, S. Dual Authentication For Bluetooth Connection.

Shaikh, F. K., & Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A comprehensive review. Renewable and Sustainable Energy Reviews, 55, 1041-1054.

Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. International Journal of Computer Applications, 67(19).

Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., & Huang, K. (2015). Energy harvesting wireless communications: A review of recent advances. IEEE Journal on Selected Areas in Communications, 33(3), 360-381.

Vidgren, N., Haataja, K., Patino-Andres, J. L., Ramirez-Sanchis, J. J., & Toivanen, P. (2013, January). Security threats in ZigBee-enabled systems: vulnerability evaluation, practical experiments, countermeasures, and lessons learned. In System Sciences (HICSS), 2013 46th Hawaii International Conference on (pp. 5132-5138). IEEE.

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Data Encryption Standards For Wimax. Retrieved from https://myassignmenthelp.com/free-samples/data-encryption-standards-for-wimax.

"Data Encryption Standards For Wimax." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/data-encryption-standards-for-wimax.

My Assignment Help (2018) Data Encryption Standards For Wimax [Online]. Available from: https://myassignmenthelp.com/free-samples/data-encryption-standards-for-wimax
[Accessed 31 May 2020].

My Assignment Help. 'Data Encryption Standards For Wimax' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/data-encryption-standards-for-wimax> accessed 31 May 2020.

My Assignment Help. Data Encryption Standards For Wimax [Internet]. My Assignment Help. 2018 [cited 31 May 2020]. Available from: https://myassignmenthelp.com/free-samples/data-encryption-standards-for-wimax.


At MyAssignmenthelp.com, we are committed to deliver quality assignment assistance in the fastest way possible. To make our service delivery fast, we have hired subject matter experts to work on different subject specific assignments. We have hired experts who owe in-depth knowledge in their respective subjects. As per their expertise, they provide geography assignment help, Physics assignment help, Strategic assignment help, history assignment help, art architecture assignment help and assistance with other subjects as well.

Latest It Write Up Samples

ITC544 IT Fundamentals 3

Download : 0 | Pages : 2
  • Course Code: ITC544
  • University: Charles Sturt University
  • Country: Australia

Answers: 1. (a): Firstly, let covert hexadecimal Number (6A) to equivalent decimal number. =(6A) 16                                                         &nb...

Read More arrow

1220HSL Information Systems For Services Industries

Download : 0 | Pages : 7
  • Course Code: 1220HSL
  • University: Griffith University
  • Country: Australia

Answer: Introduction The modern age of technology has brought various innovations including the eruption of a new technological innovation, known as the digital trends. In this case, a business is represented via websites and people no longer need to maintain physical retail spaces for selling goods online. As a result, the economy of the countries have also been increased mainly due to the fact that they are also supporting the innovations of ...

Read More arrow

MIS775 Decision Models For Business Analytics

Download : 0 | Pages : 5

Answer: Introduction 15 stocks from the ASX (Australian Stock Exchange) are evaluated using the LP model, the ILP model, and the NLP model as approaches in optimizing the portfolio The securities are chosen according to restrictions of asset classes and individual risk appetites The securities are also chosen according to the portfolio size restrictions and risk appetite, as well as based on portfolio risk and the required return ...

Read More arrow

ITC504 Interface Useability

Download : 0 | Pages : 6
  • Course Code: ITC504
  • University: Charles Sturt University
  • Country: Australia

Answer: About the Applicaiton The application interface that has been developed here is for a local farm shop. They run a store and also a local restaurant. The local farm shop demands to design a mobile application for their customers through which they can cater online services and concurrently expand their market. Their main products include food, wine and gifts. Apart from to selling farm products, they also run a small restaurant. The cust...

Read More arrow

MAN2092 Management Information Systems

Download : 0 | Pages : 12
  • Course Code: MAN2092
  • University: University Of Surrey
  • Country: United Kingdom

Answer: Introduction Information systems facilitate to provide accurate and timely information to management for the purpose of decision making and thus it is known as information management system. The purpose of information system is to deliver relevant and accurate information to managers so that it enables them to formulate business strategies. Thus, information system plays an important role in formulating business strategies. Further it...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,324,980

Orders

4.9/5

Overall Rating

5,075

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

265 Order Completed

97% Response Time

Ken Campbell

MSc in Electrical Engineering

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2830 Order Completed

97% Response Time

Leroy Bicknell

MBA in Marketing

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

798 Order Completed

97% Response Time

Benjamin Blakeman

MSc in Medical Technology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

752 Order Completed

100% Response Time

Hugh Cleave

Masters in Human Resource Management (MMgt, HRM)

Wellington, New Zealand

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

thank you writer the assignment was great and the work done is great. the amount that i paid is not expensive and perfect

flag

User Id: 433071 - 31 May 2020

Australia

student rating student rating student rating student rating student rating

The tutor has taken more time than expected but it was fine. I liked the work but you should make sure that you are performing everything within the time provided by students as they are paying you.

flag

User Id: 429501 - 31 May 2020

Australia

student rating student rating student rating student rating student rating

Thank you for all your research for answers to the question you did a awesome job.

flag

User Id: 434488 - 31 May 2020

Australia

student rating student rating student rating student rating student rating

Thank you amazing paper this service has been a big help to me with all my classes. Thank you again

flag

User Id: 434488 - 31 May 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?