Thursday, December 5, 2019
Three Data Encryption Standards for WiMAX Networks- myassignmenthelp
Question: Discuss about theThree Data Encryption Standards for WiMAX Networks. Answer: Counter Mode with Cipher Block Chaining Message Authentication Code Protocol This is for the encryption of all the traffic on the network. This takes hold of the encapsulated mechanism which is for the confidentiality of the data. It is mainly to create and address the vulnerabilities which are presented by WEP (Taheri et al., 2017). The forms are set with the CCMP Medium Access Control Protocol to define the sections and the control through the incremented sets of the data packet. It also includes the reserving of the data confidentiality, authentication and the access control. It is mainly in conjunction with the layer management. The formats and the standards are for the theoretical strength of the key which is 2^n. Advanced Encryption Standard (AES) For the proper management and easy transmission of the data in a secured manner. It makes use of the Wi-Fi and has a stronger encryption key management (Gautam et al., 2016). The advancement is based on handling the information technology with the blocking of the ciphers. This works on handling the different encryption packages with the access cipher that allows the secret information to be used in the NSA format to be approved with the cryptographic module. The algorithm can handle the evaluation based on the system standards. PKM-EAP (Extensible Authentication Protocol) This includes the functioning which has end-to-end authentication. This includes the entity where the mechanism is made to ensure about the valid users who can access to the WiMAX network. With this, there is a use of the service providers where the access control is based on the dial up modems (Alamifar et al. 2016). Security challenges for any two examples of WPAN technologies The Bluetooth network vulnerabilities are the disclosure threat, integrity threat and the denial of service threat where the users are blocked to get the access to a service by either handling the unavailability or severely limiting the availability. The security is important with handling the transmission of the architecture that needs a consistent upgradation with preventing any new threats. The Bluetooth devices generally are exposed to the malicious threats at the time of pairing with the other device. The weakness is mainly due to the flaws which are related to the establishment of the key protocol and handling the devices to pair with the focus on the performance and pairing (Kaur Sharma, 2016). The issues with the ZigBee are the attacks which are related to the industry security professionals and the physical attacks, key and the replay of the injection attacks. The attacker can easily gain the physical access to the device which includes the attacks so that it is effective to interact physically. With this, there other issues of the utilisation of the remote means to obtain the encryption keys. The key attacks are for the security and the ease of updating. Read the following two research papers and comment The research is about the wide deployment in the Internet of Things, Cyber Physical Systems and the other emerging areas. The taxonomy of the different energy resources could be to handle the potential with the maximisation of the energy harvested. The identification of the different challenges is related to addressing the development of the cost effectiveness, efficiency and the reliable energy harvesting systems. This also includes the details discussion and the evaluation based on the vibration harvester, thermal and the wind harvester as well. The energy harvesting the wireless communication includes the information theoretic performance which limits to the transmission of the scheduling policies and the resource allocation. Through this, the focus is on cooperation aspects and the simultaneous energy matters. The goal of the paper is to focus on thee energy harvesting the wireless communications with the new dimensions set for the intermittency and the randomness. The focus is on the summarising of the effects with the self-sufficiency and the perpetual operations. This is important to handle the control where the number of operations are set other than the transmissions that incur in the energy costs and the impact of performance. References Aalamifar, F., Lampe, L. (2016). Optimized WiMAX Profile Configuration for Smart Grid Communications.IEEE Transactions on Smart Grid. Gautam, A. K., Kumar, L., Kanaujia, B. K., Rambabu, K. (2016). Design of compact F-shaped slot triple-band antenna for WLAN/WiMAX applications.IEEE Transactions on Antennas and Propagation,64(3), 1101-1105. Kaur, K., Sharma, A. (2016). Bandwidth-Aware Stochastic Uplink Scheduling in WIMAX Networks. Taheri, M. M. S., Abdipour, A., Pedersen, G. F. (2017, March). Compact penta band printed slot antenna for GSM, Bluetooth, WiMAX, 4G LTE, and WLAN applications. InAntennas and Propagation (EUCAP), 2017 11th European Conference on(pp. 2152-2154). IEEE.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.