Sunday, May 3, 2020
Wireless Networking Concepts
Question: Discuss about theWireless Networking Concepts. Answer: Compare and Contrast Three Data Encryption Standards for Wi-MAX Networks Cipher Block Chaining (CBC) In Cipher block chaining, the Base station (BA) sends the Subscriber Station (SS), an Security Association (SA) specific initialization vector (IV) as a Traffic Encryption Key (TEK) response during the TEK three way handshake. This algorithm uses this Security Association specific Initialization vector in combination with the TEK for the encryption of data traffic. This standard does not provide a full security on data encryption (Garg, 2007). Counter (CTR) The CTR standard is very easy to implement. It encrypts the data parallel and also offers an encryption preprocessing. It is consider stronger than the CBC. But it does not has the capability to encrypted messages authenticity. Counter with CBC Message Authentication Code (CCM) The CCM add more features to CTR by addition of capability of encrypted messages authenticity. It is considered as the most secured cryptographic data encryption standard. The CCM has the following characteristics Providing confidentiality to packet payload and also provides integrity protection to packet payload and packet header. It uses single cryptographic key for providing integrity and confidentiality and thereby minimizes the complexity and also maximizes the performance. Reduction of latency by computation of the cryptographic parameters which are used for the acknowledgement of packets which enables fast comparisons. Minimization of costs by implementing less sized hardware and software. Packet overheads which related to security are small (Garg, 2007). WPAN Technology Security Challenges Wireless USB In wireless USB, there are some criteria about the security. Confidentiality Data should be accessed by the people who are authorized to access the data and make use of it. The data need to be kept as a secret to any entities and that the confidentiality of the data can be preserved. (Chandra, 2008). Availability The servicing nodes should be available to serve the data whenever needed. For many service nodes, this is a challenge. The servicing nodes are prone to DDoS attacks. Even though the servicing nodes are hale and healthy, the servicing nodes under DDoS attack will spend all their resources in responding to DDoS attacks. So they cannot serve the data for what the servers are built. The affected nodes are called as selfish nodes. (Chandra, 2008). Integrity When the data is in travelling losses will be there. The data should be properly identified so that the integrity of the data can be preserved. Authenticity: The users who are asking data should be the correct and genuine people. There are mistaken identities and it will create lot of problems for the sender and receiver. For avoiding this the proper identification method should be used. If there is no authentication, anyone can get access the confidential information or can easily send fake messages to anyone (Chandra, 2008). Now, we are facing challenges with the security which is classified into two categories, security attacks and security services like fault diagnosis. To prevent the attack, we are using key management services, Intrusion detection Techniques and Secure Routing (Chandra, 2008). ZigBee WPAN Technology: The Zigbee WPAN technology transfers the data that can extend up to the 70 meters. The ZigBee WPAN is named as 802.15.4, where the main goal is to monitor and control the software applications, which relatively very low range of information throughput is essential with the possibility of power consumption (Chandra, 2008). The Data transferred in the ZigBee technology is given as packets, which has the maximum size as 128 bytes and it allows the highest payload up to 104 bytes. When comparing to other WPAN technologies, this ZigBee has very high data transfer rate. The Security in ZigBee implements double layers, one for the Network Layer and the Application Layer for Security. The Security policy AES 128b Encryption standard algorithm, which is deployed for the MAC Layer. This implements three types of Keys, namely link, network and master keys (Chandra, 2008). Link Keys The relay as unique key between each pair of nodes. This Link keys are managed and controlled by Application layer. The Encryption standard is performed between all the pair of nodes, so this occupies more memory space (Briere, Ferris, Hurley, 2006). Network Keys Network key is a 128b where all devices can be shared in this network. Network key are formed byTrust Centerand again formed at different interval.To join in the network every node need the Network Key. If the trust center had planned to alter the Network Key, latest one will come through the network Master Keys Master keys are already install in each node. Master keys target is to keeps their Link Keys asprivate. In theKey Establishment Procedure (SKKE) Link key will transfer among two nodes. The pair of nodes will have both link and network keys. The link key is always used, with more security but occupies more memory space. The Two security policy are updated, which the data centers can follow: Commercial Mode: The data centers can transfer their keys between the pair of nodes using the network key. Since, this occupies more memory resources. This offers a centralized model for key security control. Residential Mode: The data centers share only their network key, Due to the low resources, it will be in the ideal mode. This mode is chosen, when the wireless sensor model is implemented. References A survey of WiMAX security threats. (2016).Cse.wustl.edu. Retrieved 27 September 2016, from https://www.cse.wustl.edu/~jain/cse571-09/ftp/wimax2/ Briere, D., Ferris, E., Hurley, P. (2006).Wireless home networking for dummies. Hoboken, NJ: Wiley. Chandra, P. (2008).Wireless networking. Amsterdam: Elsevier/Newnes. Garg, V. (2007).Wireless communications and networking. Amsterdam: Elsevier Morgan Kaufmann.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.