Wednesday, May 6, 2020
Data Encryption Standards for WIMAX Networks â⬠Free Samples
Question: Discuss about the Data Encryption Standards for WIMAX Networks. Answer: Data Encryption Standards for WIMAX Networks DES: DES is the short form for Data Encryption Standard. The technology is utilized as the primary guidelines for the procedure of information encryption (ISLAM AZAD, 2014). The symmetric nature of the information encryption standard includes the advancement of the procedure of encryption for the information management by utilizing the keys. The sender is constantly told about the key that is used in encryption for the DES processing before the execution for the encryption procedure. Regularly the extent of data encryption key utilized by DES is 64 bits. Be that as it may, the real accessible size for the key of DES encryption is 56 bits just as the rest of the 8 bits are left for parity analysis for the information models. DES encryption was produced and planned by IBM. The DES encryption is an open standard for the encryption procedure of the information and data. AES: AES stands for Advanced Encryption Standard. The AES is a piece symmetric information standard (Karthik Muruganandam, 2014). The ramifications of the propelled information gauges are utilized for framing the piece encryption in the association. The Advanced Encryption Standard is exceptionally useful for the following the encryption standards for the most secured operations that is implied by the US government too. The US government had picked this standard for the improvement of the insurance of the arranged and private data. The AES encryption process utilizes indistinguishable keys for implementation of improvement of encryption and information assurance. The benchmarks of the encryption can acknowledge the information obstruct for encryption having length of 128 bits. Among the processes the 3 keys utilized for the encryption are 128 bits, 192 bits, and 256 bits long individually (Bhanot Hans, 2015). The AES procedure of encryption includes the handling of the entire piece comprising of information in a parallel way to use the substitution method and stages for each round. Triple DES: As opined by Barker and Barker (2012), the technology of Triple DES is a changed and advanced type of Data Encryption Standard utilized for the procedure of encryption. The system of encryption utilizing Triple DES encryption procedure would include the utilization of 3 isolate keys for the effective completion of the encryption. The calculation utilized for Triple DES encryption incorporates the use of the DES thrice to secure the information and data. The keys utilized as a part of the Triple DES encryption comprise of three bits size and it can be utilized for encryption of the information. The first (56 bits) and third key (168 bits) is utilized for encoding the information. Be that as it may, the second key (112 bits) is utilized for decoding of the information. Security Challenges of WPAN Technologies Security Issues for using Bluetooth: Bluetooth is a propelled innovation for exchanging of document and media by utilizing the Bluetooth infrared information exchange (Padgette, 2017). However the innovation had been confronting many issues and difficulties of security like Bluejacking, Bluesnarfing assault, and Backdoor Hacking. The Bluejacking is the procedure when the programmers effectively execute the wholesale fraud for separating essential data from the framework gadgets (Minar and Tarique, 2012). The Bluesnarfing assault contains event of the assault in the Bluetooth arrange by the way toward hacking. The programmers in this situation hack into the system of Bluetooth of accessing the classified and private information and data for their own advantages. The Backdoor Hacking is the risk to the Bluetooth innovation for the abuse of the vulnerabilities that are present in the framework. The programmers penetrate the gadget and frame the invasion of the gadget that can be done wi thout even requiring to be matched with the touchy information. Consequently Bluetooth gadgets had been confronting many issues and difficulties of precautions like Bluejacking, Bluesnarfing assault, and Backdoor Hacking. The programmers in this situation hack into the system of Bluetooth of accessing the secret and private information and data for their own advantages. The programmers invade the gadget and frame the penetration of the gadget that can be done without even requiring to be matched with the delicate information. Security Issues for using Zigbee: Zillner and Strobl (2015) have stated that Zigbee is a progressed WPAN innovation utilized for conveying and exchanging of the data starting with one client then onto the next. The difficulties of security looked by the Zigbee innovation are hacking and impersonation of Zigbee hub. The programmers and digital hoodlums utilize straightforward techniques for hacking the Zigbee with their knowledge about the way that the innovation of Zigbee utilizes the radio recurrence waves and it turns out to be anything but difficult to focus on the Zigbee radio gadgets by misusing the recurrence work. The encryption of the Zigbee utilizing gadgets are focused by the assailants (Wang, Jiang Zhang, 2014). The clients would not know about their gadgets being hacked remotely by utilizing the hacking strategy. Now and again, the programmers utilize the innovation for getting into its framework gadgets from remote and distant places. The physical access to the gadget i s another figure that outcomes security issues. Critical Reflection on Energy Harvest The harvesting of energy is a primary concern for the development of the effective and improved processing of the energy (Shaikh Zeadally, 2016). The power generation for the energy harvesting would be deployed for forming the use of the energy resources for power generation in WSN. The energy resources can be either exhaustible (non renewable) resources or non exhaustible (renewable) resources. The generation of the power would be facilitated by the use of the energy nodes by WSN. The problems and issues faced by the WSN had resulted in the requirement for deploying the effective and improved technology. The various energy sources like solar and wind can be used for generating the energy for WSN. The solar energy is the most prominent source of energy and it forms the utilization of the solar rays for generation of energy. The solar energy provides the most cleanly and green energy and it would involve the deployment of the synthesis methods for the generation of the power. The ray s of the sun are entrapped in voltaic cells by the use of solar panels. The solar energy is utilized for forming the development of the electrical energy by converting the heat energy. The wind energy is synthesized by using Windmills. The force of the air would help in rotating the wings of the windmills. The rotation of the fangs would tend to develop the running of the motor for generating the energy 9 Ulukus et al., 2015). The mechanical energy would be converted to electrical energy. The solar and wind energy sources would be used for generating the energy for WSN. The rays of the sun are entrapped in voltaic cells by the use of solar panels and the wind energy is synthesized by using Windmills. References Barker, W. C., Barker, E. B. (2012). SP 800-67 Rev. 1. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. Bhanot, R., Hans, R. (2015). A review and comparative analysis of various encryption algorithms.International Journal of Security and Its Applications,9(4), 289-306 ISLAM, E., AZAD, S. (2014). data encryption standard.Practical Cryptography: Algorithms and Implementations Using C++, 57. Karthik, S., Muruganandam, A. (2014). Data Encryption and Decryption by using Triple DES and performance analysis of crypto system.International Journal of Scientific Engineering and Research, 24-31. Minar, N. B. N. I., Tarique, M. (2012). Bluetooth security threats and solutions: a survey.International Journal of Distributed and Parallel Systems,3(1), 127. Padgette, J. (2017). Guide to bluetooth security.NIST Special Publication,800, 121. Shaikh, F. K., Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A comprehensive review.Renewable and Sustainable Energy Reviews,55, 1041-1054. Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., Huang, K. (2015). Energy harvesting wireless communications: A review of recent advances.IEEE Journal on Selected Areas in Communications,33(3), 360-381. Wang, C., Jiang, T., Zhang, Q. (Eds.). (2014).ZigBee network protocols and applications. CRC Press. Zillner, T., Strobl, S. (2015). ZigBee exploited: The good the bad and the ugly.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.