Wednesday, December 11, 2019

Data Encryption of WiMax Networks

Question: Describe about the Data Encryption of WiMax Networks. Answer: Wimax: Nowadays wireless technology is the most important thing in our daily life. Wifi is most common used technology in busy life. Basically, wifi is the data transmitting signal which is transmitting the radio wave instead of wire means it is wireless technology. WiMAX is similar to the wifi technology but it has the much bigger scale and faster speed. Wimax gives services to the enterprises and residential for its economic growth. For any wireless technology, security is a very important thing and it must be addressed. Encryption is the process of enciphering data or messages in such a path that only authorised persons can read it. Encryption is the secret communication services used by military and government for a long time. Nowadays it is very common services. Many company and enterprises will begin to utilise WiMAX for communicating from office to office, relative near to each other, gives campus wireless connectivity to the employee (Nuyami, 2007). Wimax is successful because it is easy to use and high speed and range relatively low cost. The intent of encryption is to secure that only the authorised person can read the data. WiMAX utilises 3DES and AES for encrypting their data transference on the network. The Triple Data Encryption standard (3DES) utilises three different keys with a length of 56 bit each. The utilisation of three keys causes for a slower execution in some software. The main encryption technology is used by WiMAX is the AES (Advanced Encryption Standard). AES gives support for 128-bit, 192-bit, or 256-bit for encrypting keys (Nuaymi, 2007). AES is the very popular algorithm used for encryption. AES is faster and widely used encryption standard than 3DES.AES is very easy to use and utilises very little memory. Except all of this 3DES is the main data encryption technology in Wimax. There are two types of secret writing is used nowadays one is Symmetric or secret key cryptography and another one is asymmetric o r public cryptography. The most important for data encrypting was a symmetric algorithm which is known as Data Encryption standard. DES is 64-bit encipher which means it encrypts 64 bit of data. Data encryption enciphers and most of the major symmetric encipher are based on a encipher is known as the Feistel block encipher. It was invented by the IBMs cryptography researcher Horst Feistel in the early of 70s. Triple data encryption gives us a simple method of growing the key size of DES to protect against attacks. It uses a key bundle that constitutes the three DES keys each of 56-bit ((Labiod et al., 2006). The encryption algorithm is given below: Enciphertext = Ek3(Dk2(Ek1(plaintext))) Methodology: That means DES encrypt with k1 then decrypt with k2 ad then encrypt with k3. Each triple encryption can encrypt one block of 64 bit of data. Some diagram is given below for understanding the 3DES encryption used by WiMAX network 2. Research the security challenges for any two examples of WPAN technologies? WPAN and Security: Two examples of the WPAN technologies are Bluetooth and IEEE 802.15, these two particular technologies are used. Bluetooth is a standard which is used to enable wireless communication between mobile computers, phones and other portable devices we use in our day to day works. Bluetooth does not require a line of sight for establishing a connection between two devices which supports Bluetooth. A typical range of 10 meters is possible and with some arrangement the range could be extended to 100 meters. Specification: Bluetooth 2.4 GHz v1.1: 720 Kbps; v2.0: 10 Mbps 10 meters (30 feet) to 100 meters (300 feet) Automatic device discovery; communicates through physical barriers. Security challenges: There are different security related challenges which the Bluetooth device generally faces. Denial of service: The Bluetooth devices may face malware attacks from the hackers and intruders. They can crash or hack the devices that are connected to the Bluetooth. In 2003, Bend and Adam from A.L digital Ltd discovered some serious flaws in the security of the Bluetooth connectivity as per their research the personal data security can be compromised. MAC spoofing attack: Among all the attack the most frequent attack is the MAC spoofing attack. Attackers can perform MAC spoofing while the PIN is being generated by the Bluetooth device for connection. With the help of some specialized hardware, intruders can alter the flow of data between two devices (Saleem, Ullah, Kwak, Kwak, Sup, 2011). IEEE 802.15: IEEE 802.15 is developed by the IEEE for short-range wireless communication between devices. It has the same goal as the Bluetooth to connect two portable devices without using any cable for the connectivity between them. The 802.15 WPAN group was formed in the year 1999 as a part of local and metropolitan Area network standard committee of IEEE. The 802.15 specifications are aimed to update the Media access control and physical layer of Bluetooth (Saleem, 2011). Specification: IEEE 802.15 2.4 GHz 802.15.1: 1 Mbps 802.15.3: 20-plus Mbps 10 meters (30 feet) to 100 meters (300 feet) Uses Bluetooth as the foundation; coexistence with 802.11 devices. Security Threat: Layers DoS Attacks Defenses Physical Jamming Tampering Tamper-proof, hiding mapping, the mode change Link Collision Unfairness Exhaustion Rate limitation Network Misdirection Black holes Authorization, monitoring, redundancy Transport Flooding Authentication Reference: Nuaymi, L. (2007).WiMAX: Technology for broadband wireless access. United States: Wiley, John Sons. Labiod, H., Afifi, H., De Santis, C., Labiod, H., Hossam, A., de Santis, C. (2006).Wi-Fi, Bluetooth, ZigBee and WiMax(11th ed.). Dordrecht: Springer-Verlag New York. Saleem, S., Ullah, S., Kwak, K. S., Kwak, Sup, K. (2011). A study of IEEE 802.15.4 security framework for wireless body area networks.Sensors,11(2), 13831395. doi:10.3390/s110201383 Bluebug.The home of the trifinite.Group. Retrieved September 16, 2016, from https://trifinite.org/trifinite_stuff_bluebug.html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.