Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

1. Compare and contrast three data encryption standards for WiMAX networks?

2. Research the security challenges for any two examples of WPAN technologies.

3. Read the following two research papers as follows, please give your critical reflection on the topic of Energy Harvest.
Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016): 1041-1054.

Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381.

4. Telestra is a company that is licensed to provide wired telecommunication services in Australia. The company has contracted Exetel to assist it with the selection and implementation of a new field service system. The goal is to provide service technicians with wireless access to the corporate network and a vast electronic library of technical manuals and schematic diagrams, which would reduce or eliminate the need for staff to carry a large number of books and drawings, especially while servicing equipment underground or when climbing on transmission towers. In addition, this means that the technicians would be able to immediately read and update the records for all the equipment, thereby avoiding massive amounts of paperwork as well as potential errors and omissions. However, the company is having trouble deciding on which technology to adopt- handheld cellular, tables with 3G/4G/5G access, or notebooks equipped with cellular cards. Exetel has asked you to help.

Create a presentation outlining the advantages for Telestra of using digital cellular handsets or cellular wireless cards. Determine the ability of the smaller cellular handsets (as opposed to notebook computers, which may be difficult to carry everywhere) to display standard PC documents such as Word, Excel, and PDF files, and evaluate how this could help the company. Because the group you will be presenting to is composed of nontechnical manager, be sure your presentation is understandable by both technical and non-technical personnel. Limit yourself to a maximum of 15 PowerPoint slides

Data Encryption Standards for WiMAX Networks

Worldwide Interoperability for Microwave Access (WiMax) is referred as the delivery of the services to the long wireless broadband access. It provides point-to-point as well as multipoint applications (Yang, 2014). On the other hand, it is enabled for enhancing security of the network at the time of transmission to the last mile. In addition, WiMax utilizes three types of data encryption standards in order to protect data as well as information. WiMax utilizes Counter Mode with the Cipher Block Chaining Message Authentication Code Protocol (CCMP) in order to encrypt traffic on the particular network. Moreover, it utilizes Advanced Encryption Standard in order to transmit data securely.

The data encryption standard utilized by WiMx can be explained as followed.

It has intended to supplant original Data Encryption Standard algorithm that is figured by the hackers at the end for figuring out the procedure to vanquish in effortlessly. Triple DES has suggested the standard as well as the most generally used symmetric algorithm in the business. It uses three individual keys with 56 bits each. In addition, the aggregate key length is measured as 168 bits (Guo et al, 2014). On the other hand, specialists have contended that there are 112 bits are included in 112 bits in the key quality that is more similar to the process. Thus, in spite of gradually eliminated, there are triple DES that can still figure out the procedure to make a tried as well as encryption for true equipment encryption answer for the administrators along with distinctive projects.

The Advanced Encryption Standard (AES) is recognized as the algorithm that is trusted as the standard by the Government of USA as well as several organizations. In spite of the particular fact, it is a great degree, which is proficient in 128 piece frame format.  In addition, the Advanced Encryption Standard (AES) uses the keys of 192 as well as 256 bits for the substantial obligation encryption purposes. AES is viewed as making impenetrable to the assaults, which is except for making savage power. It endeavors to make disentangle messages using each of the single and conceivable blend in 128, 192 as well as 256 piece (Huang et al., 2013). On contrary, there are security specialist that is trusted in making the process single conceivable and in the end to be hailed as the right standard in order to encode information in the particular private sector.

Security Challenges for WPAN Technologies

RSA is considered as the open key encryption algorithm as well as the standard to scramble information that is sent over the web. It generally occurs on different strategies that are used as the part of PGP as well as GPG programs. On the other hand, it is dissimilar to the triple DE and RSA that are viewed as asymmetric algorithm as the use of the keys are included in this. In this perspective, the key is generally open and the particular things used in order to scramble the message as well as private keys for decoding. However, the consequences of RSA encryption is considered as immense clump, which gets aggressors of times as well as preparing energy for break.

It is important to identify the most important WPAN technologies that are Bluetooth as well as Zigbee. In addition, there are several security challenges in Bluetooth devices as well as technology at present usages. On the other hand, it is important to mention that there are several attacks against the confidentiality as well as integrity of data (Dehwah et al., 2015). Moreover, Bluetooth does not provide effective customer verification. Authorization of the Bluetooth devices cannot be achieved, which can cause explicit behavior of the connected devices. In this perspective, it is important to mention that there is a massive threat for DoS attacks on the Bluetooth devices at the time of transmission of data as well as information. It can be malicious entry of the external parties at the time of transmission procedure of data. However, sensitive data might be damaged as well as corrupted at the time of wireless transmission.

Bluesnarfing is one of the threats involved in the technology that can allow the attackers in order to increase the utilization of the devices that are Bluetooth enabled. In addition, it searches for IMEI number of the Bluetooth devices as well as getting connected through the procedure. In this perspective, it is required to connect with the Bluetooth enabled mobile devices. It is important for the attackers to have span messages along with phishing mails that can cause damages to mobile phones.

ZigBee is one of the wireless communication with low power as well as low rate aims to give cryptographic keys for security. The particular link is established between the devices and maintained through security protocol of ZigBee (Fadel et al., 2015). In addition, there are chances of physical attacks on ZigBee radio related to the frequency breach. Thus, the data packers are collected at the time of wireless communication, which can be breached in the network.

Energy Harvesting in Wireless Sensor Networks

1st article: Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016): 1041-1054.

The paper discusses with the process of using of energy in Wireless Sensor Network.  The network includes a large number of static sensor nodes, which assists in the low processing. In addition, there are several sources of energy including in Wireless Sensor Network and radio frequency based energy involved in the network. Along with these, solar based energy as well as thermal based energy and flow based energy harvesting is included in the procedure. There are also several approaches described in the present paper for the purpose of using energy effectively. On the other hand, the energy harvesting from distinctive sources, which can cause damages to ecological balance of nature. On the other hand, harvesting from distinctive sources can cause depletion of the resources in the specific environment. However, there are long lasting devices that can consume more battery as well as causes energy draining. It is important to make energy efficient reliable systems, which can provide advantages to the particular users in the form of ultra-energy efficient sensors (Butun, Morgera & Sankar, 2014). In order to overcome the main limitations, design as well as development of efficient as well as high performance energy harvesting systems for Wireless Sensor Networks. It is important to consider that the models having potential can be used in order to maximize energy harvested of wireless sensor networks. It is also important to detect some of the issues that are still required for addressing the process in order to develop cost effective, efficient as well as reliable energy harvesting systems for the environment.

2nd article: Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381.

In the particular article, there are discussions about new technologies implemented in the process of energy harvesting sector. There are new advancements in energy harvesting, which can be changed for traditional scenario of energy harvesting. However, the effective utilization of the modern technique in the processing of energy harvesting. It has increased initial costs of several energy sources along with depletion of natural sources. There are also several equations as well as theories related to the process have been discussed in the present paper, which uses the customary concept of the energy harvesting as well as converting it into the modern technology. There are possibility of enhancement in traditional theory, which have been upgraded into the modern tactics. In this perspective, the use of VLSI model is useful in order to comprehend energy as well as complexity of the process of decoding as well as encoding in the specific system involved in the network.

In addition, providing energy to the process of harvesting capability to the wireless sensor devices to the nodes that can be continually acquire energy from the nature as well as man-made scenario. It turns to provide promising future for the wireless networks as well as self-sustainability of along with the virtual operation with the network (Tunca et al, 2014). It is important to have proper procedure of energy harvesting with the help of wireless networks that are usually expected in introducing various transformative changes in the wireless sensor networking (Rault, Bouabdallah & Challal, 2014). On the other hand, it is important to have wireless networking with expected advantages of minimizing the utilization of conventional energy along with accompanying the process. 

References

Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.

Dehwah, A. H., Taieb, S. B., Shamma, J. S., & Claudel, C. G. (2015, June). Decentralized energy and power estimation in solar-powered wireless sensor networks. In Distributed Computing in Sensor Systems (DCOSS), 2015 International Conference on (pp. 199-200). IEEE.

Fadel, E., Gungor, V. C., Nassef, L., Akkari, N., Malik, M. A., Almasri, S., & Akyildiz, I. F. (2015). A survey on wireless sensor networks for smart grid. Computer Communications, 71, 22-33.

Guo, S., He, L., Gu, Y., Jiang, B., & He, T. (2014). Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links. IEEE Transactions on Computers, 63(11), 2787-2802.

Huang, P., Xiao, L., Soltani, S., Mutka, M. W., & Xi, N. (2013). The evolution of MAC protocols in wireless sensor networks: A survey. IEEE communications surveys & tutorials, 15(1), 101-120.

Rault, T., Bouabdallah, A., & Challal, Y. (2014). Energy efficiency in wireless sensor networks: A top-down survey. Computer Networks, 67, 104-122.

Tunca, C., Isik, S., Donmez, M. Y., & Ersoy, C. (2014). Distributed mobile sink routing for wireless sensor networks: A survey. IEEE communications surveys & tutorials, 16(2), 877-897.

Yang, K. (2014). Wireless sensor networks. Principles, Design and Applications.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Comparison Of Data Encryption Standards For WiMAX Networks, WPAN Technologies, And Energy Harvesting In Wireless Sensor Networks Is An Essay.. Retrieved from https://myassignmenthelp.com/free-samples/itc513-wireless-networking-concepts/code-protocol.html.

"Comparison Of Data Encryption Standards For WiMAX Networks, WPAN Technologies, And Energy Harvesting In Wireless Sensor Networks Is An Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/itc513-wireless-networking-concepts/code-protocol.html.

My Assignment Help (2021) Comparison Of Data Encryption Standards For WiMAX Networks, WPAN Technologies, And Energy Harvesting In Wireless Sensor Networks Is An Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/itc513-wireless-networking-concepts/code-protocol.html
[Accessed 13 November 2024].

My Assignment Help. 'Comparison Of Data Encryption Standards For WiMAX Networks, WPAN Technologies, And Energy Harvesting In Wireless Sensor Networks Is An Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/itc513-wireless-networking-concepts/code-protocol.html> accessed 13 November 2024.

My Assignment Help. Comparison Of Data Encryption Standards For WiMAX Networks, WPAN Technologies, And Energy Harvesting In Wireless Sensor Networks Is An Essay. [Internet]. My Assignment Help. 2021 [cited 13 November 2024]. Available from: https://myassignmenthelp.com/free-samples/itc513-wireless-networking-concepts/code-protocol.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close