Wednesday, May 6, 2020

Wireless Networking Concepts Personal Network

Question: Describe about the Wireless Networking Concepts for Personal Network. Answer: Compare and Contrast three data encryption standards for Wi-MAX networks. The Cipher Block Chaining (CBC), Counter (CTR) and Counter with CBC Message authentication code (CCM) are the three data encryption standards (Labiod, Afifi, De Santis, 2007). Cipher Block Chaining Traditional data transfer implementation methods are used. To encrypt the data traffic, the algorithm uses Initialization vector along with TEK. The particular initialization vector, as per the Security Association is sent as a Traffic Encryption Key (TEK) response when there is TEK three way handshake. The Cipher Block Chaining uses the base station for sending the data to the Subscriber Station. It has various complexities. It doesn't guarantee the data encryption. Algorithm is utilized for accomplishing the task. But, it offers low Performance. Counter Parallel method of data transmission is carried out for encrypting the data. Compared with CBC it works fine. The implementation is easy. It doesn't see the authenticity for the encrypted messages. It takes care of the encryption pre-processing. It has better features than CBC. Very few complexities are solved. Performance is increased when compared with CBC. Counter with CBC Message authentication code Extra features are included. These features are better than CBC and CTR. It offers more security to ensure data authentication. It retains the CTR mode for encrypting the data. The cost for implementation is low. The encrypted messages contains authenticity. It offers a secure cryptographic data encryption standard. It was generally designed for a non-patented alternative for OCB. Research the security challenges for any two examples of WPAN technologies. The well-known standards of WPAN are as follows ("Wireless Personal Area Network Technologies and application", n.d.): Proprietary standards based on Embedded Wireless Chips. ZigBee IEEE 802.15.4 Bluetooth IEEE 802.15.1 UWB IEEE 802.15.3a The two examples for WPAN technologies are the ZigBee WPAN Technology and the Wireless USB. These two technologies possess few security challenges. Security challenges for ZigBee WPAN Technology This technology is generally known 802.15.4. It is a technology which is utilised for data transfer. The data transmission is of about 70 meters. The software applications are controlled and monitored by this technology. The security policy AES 128b Encryption standard algorithm is utilised and the MAC Layer is deployed. The main keys which are used in this implementation are listed below (Labiod, Afifi, De Santis, 2007): Link Key This type of keys are unique in nature. They are utilised for connection between the two nodes. For the storage of resources it requires more memory space. It makes use of the Application Layer for controlling and managing the Link keys. Network Key The purpose of network key is to provide connection between each node in the network. There is trust center which helps in forming the network keys and they are also formed at different intervals. The objective is to share the devices that are present in a network by using a network key. Master Keys This type of key is focused to maintain the privacy of the Link keys. Therefore, it requires the master key to be installed in all the nodes that are present in a network. It not just uses the Link key but also uses the Network key. And a pair of security policies are used. These policies help the data centers by using the commercial mode and the residential mode. Commercial Mode Makes use of the centralized model. The centralized model manages the security of the keys. Uses the network keys. More memory space is needed. Residential Mode Here, the sharing of network keys is allowed. This concept reduces storage space. The wireless sensor model is implemented. The 80.11 standard is used for admission control with the help of Access Control Lists. The absence of MAC address in the list means the node received the denial of service. The other issues are packet dropping and packet rerouting. The use of cryptography is suggested to solve these security issues. Symmetric and Public key solutions are also useful (Labiod, Afifi, De Santis, 2007). Security challenges for Wireless USB Technology The wireless technology provides more speed. This technology is increasing in the desktops, mobile phones and so on. The wireless USB has evolved so well that it has extended its technology as a wireless technology. It can provide high speed connection with the devices. To ensure the security, the authenticity of the device must be enabled to allow the device to connect with the other device ("Wireless USB The First High-speed Personal Wireless Interconnect", 2004). The use of cables is eradicated with the Wireless USB technology. The main source of communication is the radio frequency. It can communicate till 3 meter area range. The encryption security challenges are handled. The authenticity, privacy and the denial-of-service are the major security issues in Wireless Technology. The confidentiality, availability, integrity and authenticity are the main concern of the Wireless USB. The confidentiality features are, that only the authorised user can access the information and secure the information. It is required not to reveal the information to anyone. The availability features are, that the nodes accomplishes the service. There must be a security for the nodes to avoid the service attack challenges ("Wireless Personal Area Network Technologies and application", n.d.). The integrity features are, that it requires identity and is helpful to transfer the data. The authenticity features focusses on the authorization of the devices. This technology takes steps for security, with the encryption method. This will be implemented at the Application level ("Wireless USB The First High-speed Personal Wireless Interconnect", 2004). References Labiod, H., Afifi, H., De Santis, C. (2007).Wi-Fi, Bluetooth, Zigbee and WiMAX. Dordrecht: Springer. Rackley, S. (2007).Wireless networking technology. Amsterdam: Elsevier, Newnes. Wireless Personal Area Network Technologies and application. Retrieved from https://www.winnii.com/downloads/WPAN%20technologies.pdf Wireless USB The First High-speed Personal Wireless Interconnect. (2004).Intel. Retrieved from https://www.usb.org/wusb/docs/wirelessUSB.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.