Wednesday, December 4, 2019

Wireless Networking Concepts Wi-MAX Networks

Question: Discuss about the Wireless Networking Concepts for Wi-MAX Networks. Answer: Compare and Contrast three data encryption standards for Wi-MAX networks The three data encryption standards are Cipher Block Chaining (CBC), Counter (CTR) and Counter with CBC Message authentication code (CCM). Cipher Block Chaining Counter Counter with CBC Message authentication code The (BA) base station forwards the data to (SS) Subscriber Station. The data is encrypted in a parallel order. It was developed as a non-patented alternative to OCB. A Security Association specific initialization vector is sent as a Traffic Encryption Key (TEK) response when the TEK three way handshake. It is better when compared with CBC. It is better than both CBC and CTR. For encryption of the data traffic, the algorithm makes use of Security Association specific Initialization vector combined with TEK. It handles encryption pre-processing. Combination of CBC-MAC is used for data authentication and CTR mode is used for data encryption. Complete security for the data encryption is not guaranteed by this standard. It do not contain the authenticity for the encrypted messages. It contains the authenticity for the encrypted messages. It contains traditional implementation methods. It contains simple implementation. Implementation costs less. It has no extra features instead makes use of the algorithm. It is the improved version of CBC. Additional features are added to CCM and it makes it more secured to achieve the cryptographic data encryption standard. It contains more number of complexities. Only certain complexities are resolved. It reduces the complexity to a greater extent. Performance is less. Performance is better than CBC. The performance is maximised. Research the security challenges for any two examples of WPAN technologies. The WPAN technology contains certain security challenges with respect to the Wireless USB and the ZigBee WPAN Technology. Wireless USB The Wireless USB is a technology which uses radio frequencies instead of cables. They provide connection to approximately 3mts ("Ellisys - Technology - Wireless USB", 2016). It uses the encryption and in encryption the security challenges are noticed. The Wireless USB, focuses on confidentiality, availability, integrity and authenticity (Keller, 2004). The current security challenges are in security attacks and fault diagnosis in the security services. The Intrusion detection Techniques, key management services and Secure Routing methods are used for prevention from the attacks (Kent, Tibbs, Sexton, 2009). In Wireless USB, the confidentiality follows certain criteria, they are as follows (Leavitt, 2007): The information is just provided to the authorised user. All the information is, required to be a secret. In Wireless USB, the availability follows certain criteria, they are as follows (Torres, 2008): The designed services are ensured by the node. In the nodes, the service attacks brings security challenges. They become successful in attacking the nodes. It fails to provide certain network services. In Wireless USB, the integrity follows certain criteria, they are as follows ("USB.org - Wireless USB", 2016): It is effective in maintaining the integrity. And the information is forwarded with their identity. In Wireless USB, the authenticity follows certain criteria, they are as follows (Rackley, 2007): It assures genuine communication between the users. It requires identify of the users for communicating with the other users. It ensures to claim the authenticity. In case if the authenticity is not claimed then it is possible to send the fake messages to any number of users. ZigBee WPAN Technology The ZigBee WPAN Technology, is used for transferring the data to approximately 70mts. 802.15.4 is named as ZigBee WPAN. Its main aim is monitoring and controlling the applications. It requires low range of information throughput and less power is consumed. The working process of ZigBee technology is that the data is transferred as the packets with at least 128 bytes ("What is Zigbee? | what is WPAN? | zigbee basics", 2016). This technology offers higher data transferring rate. A double layer is ensured for security. The double layer includes the security of Network Layer and the Application Layer (Labiod, Afifi, De Santis, 2007). It uses the security policy AES 128b Encryption standard algorithm. This algorithm deploys the MAC Layer. It contains the three following keys ("What is Advanced Encryption Standard (AES)? - Definition from WhatIs.com", 2016): Link Key The link keys is the unique key to connect the two nodes. The Application Layer controls and manages the Link keys. It requires more storage space. Network Key The network key is required by each node to connect the network of nodes. The Network key is used in a network for sharing the devices. The trust center forms the network key. Even at different intervals it forms the network key. Master Keys The master key ensures to keep the Link keys private. Every single node is installed with this master key. It makes use of Link key and the Network key. The master key follows a set of two security policy, which are updated and followed by the data centers. The two security policies are Commercial Mode and the Residential Mode. In the Commercial Mode, the network key is used by the data centers and are permitted to transfer their keys between the two nodes. It requires more space to store the resources, it offers a centralized model to maintain the security control of the keys (Labiod, Afifi, De Santis, 2007). In the Residential Mode, just the network keys are shared. It requires less space to store the resources and thus it is considered as the appropriate mode for implementing the wireless sensor model (Labiod, Afifi, De Santis, 2007). References Ellisys - Technology - Wireless USB. (2016).Ellisys.com. Retrieved 27 September 2016, from https://www.ellisys.com/technology/wusb.php Keller, S. (2004).Wireless USB. Labiod, H., Afifi, H., De Santis, C. (2007).Wi-Fi, Bluetooth, Zigbee and WiMAX. Dordrecht: Springer. Leavitt, N. (2007). For Wireless USB, the Future Starts Now.Computer,40(7), 14-16. https://dx.doi.org/10.1109/mc.2007.238 Rackley, S. (2007).Wireless networking technology. Amsterdam: Elsevier, Newnes. Torres, G. (2008).Introduction to Wireless USB (WUSB) - Hardware Secrets.Hardware Secrets. Retrieved 27 September 2016, from https://www.hardwaresecrets.com/introduction-to-wireless-usb-wusb/ USB.org - Wireless USB. (2016).Usb.org. Retrieved 27 September 2016, from https://www.usb.org/developers/wusb/ What exactly is Wireless USB?. (2005).Communications Engineer,3(4), 46-47. https://dx.doi.org/10.1049/ce:20050415 What is Advanced Encryption Standard (AES)? - Definition from WhatIs.com. (2016).SearchSecurity. Retrieved 27 September 2016, from https://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard What is Zigbee? | what is WPAN? | zigbee basics. (2016).Rfwireless-world.com. Retrieved 27 September 2016, from https://www.rfwireless-world.com/Terminology/what-is-zigbee.html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.