ITC513 Wireless Networking Concepts Management
Questions:
Tasks
- Compare and contrast three data encryption standards for WiMAX networks?
- Research the security challenges for any two examples of WPAN technologies.
- Read the following two research papers as follows, please give your critical reflection on the topic of Energy Harvest.
Answers:
The data encryption standard utilized by WiMx can be explained as followed.
Triple DES
It has intended to supplant original Data Encryption Standard algorithm that is figured by the hackers at the end for figuring out the procedure to vanquish in effortlessly. Triple DES has suggested the standard as well as the most generally used symmetric algorithm in the business. I
t uses three individual keys with 56 bits each. In addition, the aggregate key length is measured as 168 bits (Guo et al, 2014). On the other hand, specialists have contended that there are 112 bits are included in 112 bits in the key quality that is more similar to the process. Thus, in spite of gradually eliminated, there are triple DES that can still figure out the procedure to make a tried as well as encryption for true equipment encryption answer for the administrators along with distinctive projects.
AES
The Advanced Encryption Standard (AES) is recognized as the algorithm that is trusted as the standard by the Government of USA as well as several organizations. In spite of the particular fact, it is a great degree, which is proficient in 128 piece frame format. In addition, the Advanced Encryption Standard (AES) uses the keys of 192 as well as 256 bits for the substantial obligation encryption purposes. AES is viewed as making impenetrable to the assaults, which is except for making savage power. It endeavors to make disentangle messages using each of the single and conceivable blend in 128, 192 as well as 256 piece (Huang et al., 2013). On contrary, there are security specialist that is trusted in making the process single conceivable and in the end to be hailed as the right standard in order to encode information in the particular private sector.
RSA
RSA is considered as the open key encryption algorithm as well as the standard to scramble information that is sent over the web. It generally occurs on different strategies that are used as the part of PGP as well as GPG programs. On the other hand, it is dissimilar to the triple DE and RSA that are viewed as asymmetric algorithm as the use of the keys are included in this. In this perspective, the key is generally open and the particular things used in order to scramble the message as well as private keys for decoding. However, the consequences of RSA encryption is considered as immense clump, which gets aggressors of times as well as preparing energy for break.
Bluesnarfing is one of the threats involved in the technology that can allow the attackers in order to increase the utilization of the devices that are Bluetooth enabled. In addition, it searches for IMEI number of the Bluetooth devices as well as getting connected through the procedure. In this perspective, it is required to connect with the Bluetooth enabled mobile devices. It is important for the attackers to have span messages along with phishing mails that can cause damages to mobile phones.
ZigBee is one of the wireless communication with low power as well as low rate aims to give cryptographic keys for security. The particular link is established between the devices and maintained through security protocol of ZigBee (Fadel et al., 2015). In addition, there are chances of physical attacks on ZigBee radio related to the frequency breach. Thus, the data packers are collected at the time of wireless communication, which can be breached in the network.
The paper discusses with the process of using of energy in Wireless Sensor Network. The network includes a large number of static sensor nodes, which assists in the low processing. In addition, there are several sources of energy including in Wireless Sensor Network and radio frequency based energy involved in the network. Along with these, solar based energy as well as thermal based energy and flow based energy harvesting is included in the procedure. There are also several approaches described in the present paper for the purpose of using energy effectively. On the other hand, the energy harvesting from distinctive sources, which can cause damages to ecological balance of nature. On the other hand, harvesting from distinctive sources can cause depletion of the resources in the specific environment. However, there are long lasting devices that can consume more battery as well as causes energy draining. It is important to make energy efficient reliable systems, which can provide advantages to the particular users in the form of ultra-energy efficient sensors (Butun, Morgera & Sankar, 2014). In order to overcome the main limitations, design as well as development of efficient as well as high performance energy harvesting systems for Wireless Sensor Networks. It is important to consider that the models having potential can be used in order to maximize energy harvested of wireless sensor networks. It is also important to detect some of the issues that are still required for addressing the process in order to develop cost effective, efficient as well as reliable energy harvesting systems for the environment.
2nd article: Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381.
In the particular article, there are discussions about new technologies implemented in the process of energy harvesting sector. There are new advancements in energy harvesting, which can be changed for traditional scenario of energy harvesting. However, the effective utilization of the modern technique in the processing of energy harvesting. It has increased initial costs of several energy sources along with depletion of natural sources. There are also several equations as well as theories related to the process have been discussed in the present paper, which uses the customary concept of the energy harvesting as well as converting it into the modern technology. There are possibility of enhancement in traditional theory, which have been upgraded into the modern tactics. In this perspective, the use of VLSI model is useful in order to comprehend energy as well as complexity of the process of decoding as well as encoding in the specific system involved in the network.
In addition, providing energy to the process of harvesting capability to the wireless sensor devices to the nodes that can be continually acquire energy from the nature as well as man-made scenario. It turns to provide promising future for the wireless networks as well as self-sustainability of along with the virtual operation with the network (Tunca et al, 2014). It is important to have proper procedure of energy harvesting with the help of wireless networks that are usually expected in introducing various transformative changes in the wireless sensor networking (Rault, Bouabdallah & Challal, 2014). On the other hand, it is important to have wireless networking with expected advantages of minimizing the utilization of conventional energy along with accompanying the process.
References
Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.
Dehwah, A. H., Taieb, S. B., Shamma, J. S., & Claudel, C. G. (2015, June). Decentralized energy and power estimation in solar-powered wireless sensor networks. In Distributed Computing in Sensor Systems (DCOSS), 2015 International Conference on (pp. 199-200). IEEE.
Fadel, E., Gungor, V. C., Nassef, L., Akkari, N., Malik, M. A., Almasri, S., & Akyildiz, I. F. (2015). A survey on wireless sensor networks for smart grid. Computer Communications, 71, 22-33.
Guo, S., He, L., Gu, Y., Jiang, B., & He, T. (2014). Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links. IEEE Transactions on Computers, 63(11), 2787-2802.
Huang, P., Xiao, L., Soltani, S., Mutka, M. W., & Xi, N. (2013). The evolution of MAC protocols in wireless sensor networks: A survey. IEEE communications surveys & tutorials, 15(1), 101-120.
Rault, T., Bouabdallah, A., & Challal, Y. (2014). Energy efficiency in wireless sensor networks: A top-down survey. Computer Networks, 67, 104-122.
Tunca, C., Isik, S., Donmez, M. Y., & Ersoy, C. (2014). Distributed mobile sink routing for wireless sensor networks: A survey. IEEE communications surveys & tutorials, 16(2), 877-897.
Yang, K. (2014). Wireless sensor networks. Principles, Design and Applications.
Buy ITC513 Wireless Networking Concepts Management Answers Online
Talk to our expert to get the help with ITC513 Wireless Networking Concepts Management Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.