Wednesday, May 6, 2020
Comparative Study Different Cryptographic ââ¬Myassignmenthelp.Com
  Question:    Discuss About The Comparative Study Different Cryptographic?      Answer:  Introducation    WiMax is an emerging wireless broadband technology established on IEEE 802.16 standard that serves both fixed and mobile networks as an alternative for cable and DSL (Alzaabi, Ranjeeth, Alukaidey,  Dr Salman, 2013). WiMAX technology infrastructure is usually set up with base stations mounted by service providers to install the technology; and receivers, mounted by clients to receive wireless signals. Like any other wireless operations, WiMAX encrypts data transmission by deploying several encryption standards including triple 3DES, an improvement of Data Encryption Standard (DES), Rivest Shamir Adlemen (RSA) and Advanced Encryption Standard (AES). RSA was developed in 1977, 3DES in 1978 while AES was developed in 2000. RSA is a public key algorithm because it uses two keys pairs to encrypt and decrypt the message hence it uses an asymmetric block cipher. Both 3DES and AES use symmetric block cipher. In terms of power consumption, RSA consumes a lot of power while AES and 3DES are low    on power consumption. AES is more secure, followed by 3DES and RSA has low security. Table1 below summarizes the differences and some similarities between the three encryption algorithms (Verma, Guha,  Mishra, 2016).          Encryption Standard      Developed by      Block size      Key Size      Cipher type      No. of rounds      Speed      Security          RSA      Rivest, Shamir and Adlemen in 1977.      512bits      1024bits      Asymmetric block      0      Slow      Least secure          3DES      IBM in 1978      64bits      56, 112, 168 bits      Symmetric block      48      Moderate      More secure than DES because it performs the DES algorithm 3X          AES      NIST in 2000      128bits      128, 192, 256bits      Symmetric block      10,12,14      Fast      Most Secure          WPAN Technologies  WPAN technologies are personal area networks that connect computing devices near each other for example in a room without cable. There are various WPAN advances such as Bluetooth and Z-wave technologies.  Z  Wave WPAN  Z-Wave was released in 2004 and is awirelesstransmission standard used mainly forhome devices automation. It uses a mesh topology network and to transmits data from one device to another using low-energy radio waves. It can be applied in security systems, lighting control systems, thermostats, locks, windows, and garage door openers. Z- Wave is simpler and cheaper to install compared to ZigBee (SmartHome, 2017).  Security Issues  The most pressing challenge for computing networks is maintain data and information security. According to (ABR, 2017) Z-Wave can security problems including the following    Radio waves jamming. Since it is a wireless standard, signals can suffer a jamming attack such as interference and blocking. When radio jamming happens, data transmission cannot occur for the devices in the network making it inefficient.  Platform security weakness. Z-Wave is still an emerging technology, its security are therefore in development.  Device hacking. Since Z-Wave supports the Internet of Things technology that aims to interconnect objects together, it is prone to hacker device attacks. Internet of Things is also a developing technology.    Bluetooth WPAN  Bluetoothis awirelessstandard used to create both mobile and fixed personal area networks between devices in short range distances using radio waves.  Security issues  Like other wireless communications, Bluetooth is vulnerable to network attacks including the following(SansInsitute, 2003)    It is very easy for attackers to personify and eavesdrop on communication in a Bluetooth setup. The technology uses devices that have little security features and do not have enhanced authentication security features and can therefore provide easy intrusion to the network.  Person in the middle attack. Since it uses a hopping mechanism, it is easy to intercept data communication in a Bluetooth network setup.  Denial of service attack. Bluetooth networks signals are prone to radio signals denial of service attack making them inefficient.      Energy harvesting: A reflection  To lay ground on energy harvesting critical reflection according to the two papers, I would like to first introduce the concept of wireless sensor networks (WSNs). WSNs are wireless networks comprising of spatially dispersed independent devices using sensors to monitor physical or environmental conditions. They are applied in health monitoring, area monitoring, natural disaster prevention, forest fire detections, resource monitoring, home devices automation and more. The most important thing in a WSN is energy for the nodes in the network. They need constant energy to be able to perform their functions. To achieve this, energy harvesting is important. It is the concept of obtaining thermal, kinetic, wind, solar energy for WSN devices. Looking at some of the recent advances in technology such as the Internet of Things, energy harvesting will increasingly develop in future. It is therefore important to perform energy harvesting in order to sustain WSNs.  Both authors agree on the fact that WSNs network need to be constantly supplied with energy for efficiency and continued operation. For instance, a WSN that has been set up in the middle of a forest to detect a forest fire would be of no help if the nodes are depleted on battery power.  It is important to measure the required energy levels of a WSN before seeking to harvest the energy for its use. Ambient energy resources may not be enough to provide the needed energy and external sources may be called for.  Energy harvesting will be very crucial for the development and sustainability of wireless communication standards in future. It is thus important to evaluate energy sources and implement procedure to facilitate the developments.  Technology is increasingly changing and enhancing our lives. Energy harvesting is an emerging technology that will improve wireless communication standards especially WSNs. It will enable their efficiency and sustainability, as well as help conserve other energy resources.  Digital Cellular Handsets  A digital cellular handset is a mobile device that can receive both audio and digital data, process it and transmit it in form of radio waves (TechTarget, 2017).  Benefits of using cellular handsets for Telestra  Cellular handsets have become very popular in use for organizations because of great features such as portability and Internet access. Cellular handsets are more convenient to use than notebook computers because they provide hands-free options such as headsets, Bluetooth enabled, can use extra batteries, and portable charging devices. Small cellular handsets also features including text messaging capabilities unlike notebooks, have a call sim cards, GPS positioning, digital camera and more. For Telestra, suing digital cellular handsets will provide the following benefits    Business productivity. Using cellular phones to work will improve business processes and therefore overall business productivity.  Improved customer experience. Since technicians will be able to access company system in the field, they will be able to provide customers with better updated responses hence enhancing customer experience  Quick system updates. Technicians will be able to update company data in the field as they work which will ensure the company is working with updated information  Less errors. Instant work updates will lessen the errors brought about by using pen and paper technology and improve business policies      References  ABR. (2017, September 20). Introduction to the Z-Wave Security Ecosystem. Management from sigma designs: https://z-wave.sigmadesigns.com/wp-content/uploads/2016/08/Z-Wave-Security-White-Paper.pdf  Alzaabi, M., Ranjeeth, K., Alukaidey, T.,  Dr Salman, K. (2013). SECURITY ALGORITHMS FOR WIMAX. International Journal of Network Security  Its Applications (IJNSA), 31-32.  SansInsitute. (2003, September 20). Bluetooth And Its Inherent Security Issues. Retrieved from Sans.org: https://www.sans.org/reading-room/whitepapers/wireless/bluetooth-inherent-security-issues-945  SmartHome. (2017, August 20). What is Z-Wave? Retrieved from smart home: https://www.smarthome.com/sc-what-is-zwave-home-automation  TechTarget. (2017, September 21). cellular telephone (mobile telephone). Retrieved from Marketing : https://searchmobilecomputing.techtarget.com/definition/cellular-telephone  Verma, A., Guha, P.,  Mishra, S. (2016). Comparative Study of Different Cryptographic. International Journal of Emerging Trends  Technology in Computer Science (IJETTCS), 58-60.    
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.