Tuesday, May 5, 2020

WiMAX Networks Triple Data Encryption

Question: Discuss about theWiMAX Networks for Triple Data Encryption. Answer: Comparison of Data Encryption Standards for WiMAX Networks WiMAX is a wireless standard named as Wi-Fi, however on a much bigger scale as well with higher speeds. WiMax utilizes 3DES, WEP and AES data encryption standards for the WiMAX networks. 3DES: Triple Data Encryption Standard utilizes three distinctive keys with a length of about 56-bit .The utilization of three keys causes slower work performance of the software. The moderate performance also limits the length of the keys and gradually makes 3DES method outdated . In cryptography, unlike AED and WEP, 3DES seems as a basic name for Triple Data Encryption Algorithm. 3DES means that there is a Symmetric-Key Cube Figure, which means that the DES cipher calculates every data block three times faster (Phan, 2007). Fig 1: 3DES encryption/decryption Source: mvd-fpga.com AES: The main tool that is used by WiMax for data encryption is the Advanced Encryption Standard. AES provides data encryption support for 192-bit, 128-bit, and 256-bit . AES works with CCMP and turned into a mainstream algorithm.It is quicker than 3DES as it is simpler to actualize and it utilizes comparatively lesser memory. AES is a devoted processor and it might not be utilized by every end-client terminals. Hence, 3DES remain a key encryption apparatus on a WiMax system. WEP: Wired Equivalent Privacy (WEP) is a security calculation for IEEE 802.11 remote systems. Presented as a major aspect of the first 802.11 standards endorsed in 1997 and its expectation was to give information privacy practically identical with the conventional wired network. WEP data encryption standard is recognized with the help of key of about Twenty-six hexadecimal digits, which is being broadly and frequently used and has now become a primary security decision displayed to clients by Switch Arrangement tools. Data encryption with WEP secures the undefended wireless connections between the clients and the access points more than AES and 3DES (Sivris Leka, 2015). Safety Challenges of WPAN Technologies Examples WPAN named as Wireless Personal Area Network is known as the network utilized to interconnect the devices that revolve around a distinct individual at a particular workspace where the networks are wireless. Bluetooth Channel Level Safety Issues: Bluetooth depends on impromptu networks and in impromptu systems, gadgets associate with each other rather than with the focal access point. Connection Level Safety Issues: If the gadget is designed to remain in a visible mode, different devices in extent send signals showing that network is accessible in its region and is prepared for pairing.This is a direct result of the Service revelation property (Soomro Cavalcanti, 2007). Applications Level Safety Issues: When Bluetooth gadgets are associated within a trusted way, then one gadget attempts to get services, however, a trusted gadget has unhindered access to each administration on the another gadget. Data Level Safety Issues: I At the time of pairing, in many cases, attackers are surely capable of going through the shrouded mode after assaulting the gadget. In this safety issue unless the client provides precise consideration for his gadget he/she never captures the error or bug. ZigBee The main security issue with ZibBee is its weak methods utilized to implement the ZigBee by vendors to sell the Internet-connected devices. Some sellers dont provide even an idea for the security of ZigBee as well as to implement the minimum features needed for it to become a certified WPAN. This might cut down the expenses of software but from the secuirty perspective, it is never successful to fulfill the users needs. Device tampering is another security concern of ZigBee as a tamper-resistant hub might erase the important information including keys which is used for the security purposes if tampering is detected in it (Zhang, 2013). References Phan, R. (2007). Reducing the exhaustive key search of the Data Encryption Standard (DES). Computer Standards Interfaces, 29(5), 528-530. Sivris, K. Leka, S. (2015). Examples of Holistic Good Practices in Promoting and Protecting Mental Health in the Workplace: Current and Future Challenges. Safety And Health At Work, 6(4), 295-304. Soomro, A. Cavalcanti, D. (2007). Opportunities and challenges in using WPAN and WLAN technologies in medical environments [Accepted from Open Call]. IEEE Communications Magazine, 45(2), 114-122. Zhang, X. (2013). Commutative reversible data hiding and encryption. Security And Communication Networks, 6(11), 1396-1403.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.