Tuesday, May 5, 2020

Information Technology Wireless Communication

Question: Discuss about theInformation Technology for Wireless Communication. Answer: Comparison and Contrast Among Three Data Encryption Standard for WIMAX Network Security is one of the major concerns for data network but in case of wireless technologies it is difficult to configure a secured one (Parashar Arora, 2013). Certain factors are needed to be analyzed for network security. In order to prevent external attacks prior authentication algorithms measured. Comparison among the three algorithms: DES AES RSA 1. Data encryption standard is referred to as an obsolete data encryption method that used symmetric key for data encryption and decryption as well (He et al., 2014). It means that data are shared in nature. 2. The sender and the receiver of the messages use the same private key for retrieving the data from the network channel. 3. DES is a kind of block cipher which is capable to encrypt plain text into cipher text in terms of permutation and combination. 4. It consists of 64 bit key block and plays a 16 round substitution role. The parity checking process takes around 56 bits of the total rounds (Malik Singh, 2013). 5. For WIMAX network, DES put positive and negative both impact on every system. In DES the strength of the encryption is associated tot the symmetric key size. It has been including as a part of academics (Parashar Arora, 2013). Rather it can be used to keep confidential data completely secured from snooping, spoofing and DOS attacks. 1. AES (Advanced Encryption standard) is the extended or advanced version of DES. It is published in the year of 2001, in terms of FIPS 197 (Burbank et al., 2013). 2. Sender and the receiver do not use the same key for encryption and decryption. It is much elegant and mathematically appreciable. 3. Different sizes of keys are present in this encryption technology. The users can choose as per their requirement. 4. Based on the size of the data the key sizes are selected such as 128 bits, 192 bits and 256 bits. In the initial stage the block sizes are divided in two parts and uses Feistel network. 5. The same cryptographers designed the standard of DES and AES but, AES is more effective to the users (He et al., 2014). 1. It is referred to as a public key algorithm. Though, the key is a pubic but it is asymmetric in nature that is the receiver and the sender do not use same key for encryption and decryption (Banerji Chowdhury, 2013). 2. The sender and the receiver use different key for encryption and decryption. 3. The encryption algorithm is strictly based on modular exponentiations. 1024 bit length for key block is provided by RSA (Hassan and Bach 2014). 4. If a user chooses long lengthen RSA or small lengthen RSA then, the efficiency will become comparatively slower than cipher DES. 5. The best solutions are provided that is for digital signature RSA should be used. Contrast Among the Three Algorithms: DES AES RSA 1. For WIMAX network, DES put positive and negative both impact on every system. In DES the strength of the encryption is associated tot the symmetric key size. 2. However, the processed key length of 56 bits has become very small for currently used modern processing systems. 3. Due to less efficiency DES is withdrawal in the year of 2005. Still advanced triple DES has been approved up to 2031 due to the presence of 168 key bit lengths. 4. Triple DES contains triple iteration of method and it is enough secured. 3DES acts slowly than primitive DES. 5. DES was widely used by different large organizations but in practical practices it has found to be inefficient than the others. 1. Basically, many similarities are found while analyzing DES and AES such as, both maintains symmetric block cipher. However, AES is much secured than DES. 2. In large organizations the rate of usage of AES algorithm is very high. 3. It can be used in wide range as it has the capability to reduce the rate of attacks such as denial of services, snooping ad spoofing. 4. For data security many organizations are already using this algorithm. 1. The cipher and decryption keys are different based on the requirement of the users. Both the function encryption and decryption are slow (Parashar Arora, 2013). 2. The implementation of hardware and software are not sufficient. The simulation speed is very high. 3. The inherited vulnerabilities are Brute force attack and oracle attack. Encryption and decryption are not scalable (refer to appendix 1). 4. The speed of encryption and decryption is slower in RSA and for the highest simulation speed the algorithm is widely used in large industries for data security. Security Challenges for WPAN Technology In traditional wired communication the issues and challenges are found to be taken major role in the network system. Though, messy network has become well configured by adopting wireless communication system. Wireless system possesses major security issues and challenges in technology. These are as follows: Network Security Models that Prevails Security Threats Due to improper configuration of network security models different performance level issue arises while managing the network operations (Burbank et al., 2013). Certain security schemas are there which cannot secure the network issues. From a complete survey it has been found that, the existing security schemes designed for the Wireless Personal Area Network (WPAN) are not well structured. The wireless communication technique lacks all the appropriate virtualization methodologies. The security models designed for the technologies do not acquire all the necessary features (He et al., 2014). Due to high inconsistency in Bit Error Rate (BER) for the wireless links, application of Compressed Real Time Transport Protocol (CRTP) is inappropriate. As, the wireless sensor network establishes a unidirectional breakdown point for the network system, for network configuration. Therefore, it creates major issue in the system designed (Burbank et al., 2013). Sometimes, it has been found that, if a ll the connected nodes are not get properly attended by the central hub, the root node lacks the security. The location trackers are strictly bounded, therefore, tracking is not possible all the times. The major monitoring zone is not appreciable due to los of improper feature legacy. Major Attacks on the Wireless Sensor Network (WSN): WSN is an advanced technology that provides much modern application of different digital devices. According to Hassan and Bach (2014), the name PAN network referred that it is personal or small sized network near about 31 feet. Traditionally the server and receivers were connected to each other with digital devices in the physical layer of the network however, currently; due to certain emerging technologies the system has become more precise and advanced (Singh, 2013). The research community has not made enough research thus; the system still lags behind any other technologies. The challenges facing by the system are as follows: The WSN do not provide security in all the layers such as physical layer, network layer, data link layer, transmission layer, application layer and process layer of the network model (Malik Singh, 2013). The system is not feasible while considering all the security features. Proper system design will be costly (Parashar Arora, 2013). Technologies used for protection are improper. Security threats cannot be handled properly due to inadequate protocol. Apart from this, the current sensor of the WPN is not active. In some cases the used ad hoc networks are ineffective for different encryption and decryption based solutions. Not only have these, but also the external attacks on routing affected the overall network system of WPAN (Banerji Chowdhury, 2013). As the encryption protocols are not independent and dependent on the router length thus, many network level issues are arising in the system. Absence of interoperability, scalability, flexibility also causes issues in the entire syst em. References Banerji, S., Chowdhury, R. S. (2013). Wi-Fi WiMAX: A Comparative Study.arXiv preprint arXiv:1302.2247. Burbank, J. L., Andrusenko, J., Everett, J. S., Kasch, W. T. (2013).Wireless Networking: Understanding Internetworking Challenges. John Wiley Sons. Hassan, A., Bach, C. (2014, April). WiMAX Basics From Deployments to PHY Improvements. ASEE. He, D., Chan, S., Zhang, Y., Guizani, M., Chen, C., Bu, J. (2014). An enhanced public key infrastructure to secure smart grid wireless communication networks.IEEE Network,28(1), 10-16. Mahajan, P., Sachdeva, A. (2013). A study of Encryption algorithms AES, DES and RSA for security.Global Journal of Computer Science and Technology,13(15). Malik, G., Singh, A. (2013). WiMAX or Wi-Fi: The next generation technology for wireless networking Infrastructure.International Journal of Advances in Engineering Technology,6(3), 1381. Parashar, A., Arora, R. (2013). Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3, 1922-1926. Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications,67(19). Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications,67(19).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.