Tuesday, May 5, 2020

Advanced Methods For Complex The Network †Myassignmenthelp.Com

Question: Discuss About The Advanced Methods For Complex The Network? Answer: Introducation WiMAX or Worldwide Interoperability for Microwave Access is a union of the organizations developing and manufacturing wireless gadgets for the improvement of IEEE 802.16 standards for networks like the Broadband Wireless Access (BWA). WiMAX is a 4G networking system and has Wireless Wide Area network (WAN) which covers the area as same as DSL lines (Ahmad Ismail, 2016). Wires 3DES (Data Encryption Standard) and AES (Advanced Encryption Standard) are used by the WiMAX for the encryption of data transferred on the network system. Three different keys have been used by this 3DES for data encryption. Each data length is about 56 bit. The encryption keys of 128-bit, 192-bits and 256-bits are generally supported by the AES. AES has been denoted as a very popular algorithm that has been built from CCMP. 3DES has a much slower process of encryption than AES. Advanced Encryption standard thus has much easier process to implement by using less memory. Though, AES does not need dedicated proce ssors on the board such as the BS. But there is also a risk of AES for not being used by every end-user terminals. At first this helps in considering the fact that the 3DES may remain an important encryption tool over the WiMAX network, even in the presence of AES (Bahl, Sharma Verma 2012). Security challenges faced by WAPN technology There are several kinds of WAPN technologies that has been implemented over the network, but two most commonly used WAPN technologies are the Bluetooth and the ZigBee network. Both of these technologies face similar difficulty, as the security issues has been faced by the wireless technology. Security challenges faced by Bluetooth technology are listed below: Eavesdropping: In this process the attacker is able to sniff the air of the transmission taken place by the Bluetooth and thus exploits the right vulnerability, reads or listens to the information (Dadhich, Narang Yadav, 2012). Bluesnarfing: In this process the attacker can pair to another device and once the device has been paired, accessibility gets easy so thus stealing of data from the Bluetooth device. Blue bugging: In this an attacker generally gets the easier access of the remote control of various aspects of the users device. Thus sending of messages, outgoing calls and texts, settings change and watching of key presses and screens and many other things must be avoided (Rewagad Pawar, 2013). Denial of service: DoS is a common data breaching process that puts a barrier between the data and the users, and thus demands for money or unauthorized order to the user for getting back the accessibility of their data. Blocking the communication, draining the battery of the device or even crashing the devices is some of the common deeds of DoS attacker. Security challenges faced by ZigBee technology are listed below (Ramsey, Mullins White, 2012): Sniffing: There is a tendency of the attackers to sniff the improper encryption used in the network system and attack the information of the network. Replay attack: In this the attacker record the approved traffic on the network and plays it later in a malicious effect. Physical Attacks: The attackers locate the device interference of ZigBee. Hard coded encryption keys which are loaded in the RAM are often employed by radios operating. The devices in the network are disturbed and flashed so there remains a possibility of replacing the keys becomes less and having known the issues the attackers can set up special serial interfaces in order to intercept the encryption key in the ZigBee device when the power rises from flash to RAM (Rawat Bhattacharya, 2016). Paper Review: Energy Harvesting Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016): 1041-1054. This article discusses about the energy harvesting techniques used in daily lives. Harvesting of energy is one of the emerging technology related to applications on indoor and outdoor environment. The demands for energy harvesting as increasing with the advancement of microelectronics and MEMS. Focusing on the classifications of the schemes used on energy harvesting techniques in WSNs. Explained that Major reason for deploying energy harvesting technique is due to the major problem faced by WSN regarding energy. Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381. 4. This article summarizes the application of energy harvesting in a broad area of wireless communication network, covering a variety of topics which includes the information-theoretical and physical layer of performance limit to the scheduling policies and medium access control protocol. Discussion of the energy and information transfer provides exciting possibilities that can be adapted in the future to adapt the network operations with improved performance. Netbooks are very difficult to repair upgrade or modify. They have a closed and integrated design. In netbooks storage drives and RAM are usually the things which someone wants to modify. It is almost impossible for someone to replace the CPU, graphics chip or the motherboard. Repairing requires professional equipment's and tools or a hired professional technician. Netbook configurations are limited. Most of the cell phones has the ability to perform tasks that a computer can as well. Accessibility of the internet writing the emails and sending documents from anywhere possible. Thus this allows people to be on top of time sensitive issues. Usage of a cell phone in the business allows for increasing flexibility while working this has numerous benefits. More flexile the organization greater is the chance to display the superiority of the business. Employees representing the company may need to keep continuous contact with the company when they are on road. References Ahmad, R., Ismail, W. (2016). Performance Comparison of Advanced Encryption Standard-128 Algorithms for WIMAX Application with Improved Power-Throughput.Journal of Engineering Science and Technology,11(12), 1-17. Bahl, N., Sharma, A. K., Verma, H. K. (2012). On Denial of Service Attacks for Wireless Sensor Networks.SYSTEM,17, 18. Dadhich, R., Narang, G., Yadav, D. M. (2012). Analysis and Literature Review of IEEE 802.16 e (Mobile WiMAX) Security.International Journal of Engineering and Advanced Technology,1, 167-173. Ramsey, B. W., Mullins, B. E., White, E. D. (2012, October). Improved tools for indoor ZigBee warwalking. InLocal Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on(pp. 921-924). IEEE. Rawat, D. B., Bhattacharya, S. (2016). Wireless Body Area Network for Healthcare Applications. InAdvanced Methods for Complex Network Analysis(pp. 343-358). IGI Global. Rewagad, P., Pawar, Y. (2013, April). Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on(pp. 437-439). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.