Encryption Techniques in WiMAX Networks
Discuss about the Wireless Networking Concepts for WiMAX.
The main purpose of this question is to highlight of the comparison and contrast of three types of data encryption standards which are in the WiMAX. WiMAX is evolved wireless technology which is based on the IEEE 802.16 standard. The security sub-layer of the WIMAX network is consisted of authentication, authorization as well as encryption which are taken place (Cao, Cheung, & Yuk, 2015). When the data are being transmitted as well as received over the WiMAX wireless infrastructure, then three types of encryption standards are being used which are used for the WiMAX networks are as follows:
- Advanced encryption standards (AES) with 128 bit key
- Rivest, Shamir and Adleman (RSA) with 1024 bit key
- Triple Digital Encryption Standard (3-DES)
Both AES as well as 3-DES are the symmetric encryption algorithms which are used of block cipher methods while RSA is asymmetrical algorithm. The difference between symmetric as well as asymmetric encryption algorithms are that the symmetric encryption consists of keys which have similar encryption as well as decryption and unlike asymmetric encryption which is used of two different keys (Bakariya et al., 2015). 3-DES encrypts of data three times with a 56-bit key. It is not secured as AES such that AES is meant as well as designed for replacement of 3-DES. RSA is asymmetrical algorithm used as public as well as private key, such a key which is used to encrypt of traffic as well as other key used for decryption (Huang et al., 2015). RSA is used for the purpose of authentication and consists of key length of 2048 of which 1028 is considered as the average size. RSA is required of CPU overhead for generation as well as maintenance compared to the symmetrical algorithms like ones mention (Jia & Deng, 2017). Three of the encryption standards are provided with confidentiality by turning of clear text into the cipher text.
Into all the three encryption standards, the encryption as well as decryption techniques are faster into AES while it is slower in case of RSA. In case of AES as well as DES, there is lower power consumption while it is higher in case of RSA. AES as well as DES are consisted of various Deciphering and Ciphering algorithm while RSA does Deciphering and Ciphering with use of same algorithm (Benveniste 2016). The time for encryption along with decryption are varied in case of the three encryption techniques for exact size of packet. Based on the comparison of three of the encryption techniques, it is concluded that decryption of the AES algorithm is better as compared to other decryption techniques for two of the algorithms such as DES as well as RSA (Thilina et al., 2015). After the contrast between AES, RAS as well as DES, it is analyzed that exchange of data with use of RSA, it is required to use of public key for the purpose of encryption while it is decrypted with use of the private keys only. The entire process of encryption is time consuming while AES algorithm it is used with use of the same key but there are huge chances of theft of the confidential data (Jabbar, Dell’Anno, & Pearlman, 2017). Apart from all this, DES algorithm is required of time for the purpose of encryption which is dependent on the key length. It is made the entire process faster as well as slower in use. DES is a longer key length which is provided of defence against the force attack along with crack able.
Comparison of Encryption Techniques
The traffic of the shared wireless medium is done with coordination based on the medium access control (MAC) protocol. It is also coordinated based on the spectrum efficiency in addition to types of wireless ad hoc network. The medium access control technique is used to enable the network stations for entering into state needed for the operations (Fafoutis et al., 2015). The particular technique can treat of the stations in terms of time as it is made of wait until it gains of entry into the networks. The technique is used to allow transmission by one of the station at time. The goal of MAC is coordination of the channel access among various nodes for achievement of the higher channel utilization (Comer, 2015). Coordination of the channel access is minimized or eliminated incidents as well as situations of the collisions and then maximizes the spatial reuse at similar time. The collisions are come from two aspects of the MANET. It is occurred due to transmissions by two and more of the nodes in certain range where the signals are collided and interfered with each others. When there are more nodes into the active nodes into range of transmitter received pair, then there are more collisions which are observed.
Collisions are resulted from the hidden terminals. The terminals are neither sense the transmission of the transmitted and receiver which reserves the packet by means of corresponding receivers (Thilina et al., 2015). The traffic process is accessed of identification of the associated stations from the basic service set, offers of different access opportunities to the station on shared transmission medium in various slots where there are time slots which is assigned based on the responsive traffic patterns. Cao, Cheung and Yuk (2015) stated that wireless networks are required to avoid the collisions by means of ensure that reaching the packets into extract destinations with RTS/CTS as well as CSMA/CA techniques. In order to reduce the collusions which are occurred into shared medium, there are required of use of collision detection protocols for upper as well as lower bounds which are identified into growth bounded graph. The graph is considered as theory based approach designed to the MAC protocol for different types of MIMO systems.
“RTS/CTS (Request to send/clear to send)” are the technique used by means of 802.11 wireless networking protocols reduces the collisions of frame which are initiated by means of the hidden node patterns. This particular protocol is set exposed the node problems however the modern RTSCTS is included of ACK and it is not solved the exposed of the node problems. This particular protocol is designed under the nodes which have same range of transmission. It is not solved hidden terminal problems (Benveniste 2016). The frames of RTS/CTS are caused the problems which are termed as exposed terminal problems into the wireless nodes. It is associated with another access point overhears exchange as well as it is signalled the back off as well as cease the transmission for the time specified into the RTS.
Medium Access Control Protocol
CSMACS technique is a network multiple access methods used in which the carrier sense is being used, but the nodes are attempted to avoid of collisions by transmission only when there are sensing of channels to become idle. When there is transmission, then the nodes are transmitted the packet data (Cao, Cheung, & Yuk, 2015). It is important for the wireless networks where there is collision detection for the alternative of CSMACD is unreliable because of hidden node problems. This particular method is operated into the data link layers into the OSI model.
The first research paper is based on “Wireless energy harvesting for the Internet of Things”, where the internet of things (IoT) are the computing perception explains the configuration of the physical objects and it is connected with the internet without any requirement if human interactions (Kamalinejad et al., 2015). The IoT is intelligent infrastructure which is consisted of particular devices competent for interacting with each others. People are on larger scale throughout use of internet, where IoT aims to create internet everywhere as well as enveloping and it has probable to influence the quality of the life for the users in various aspects (Mulani & Pingle, 2016). The devices which are connected with the IoT structure are equipped with the sensors, controlled the processors, wireless transceiver as well as energy sources for monitoring the environment as well as send and receive of data. The applications which are related to the IoT are wide ranges of the fields such as home automation, transportation, smart environments as well as many others (Cui, 2016). There are a variety of methods used to attain the energy efficiency like use of insubstantial communicational protocols and adoption of the lower power radio transceivers.
This particular article is based on wireless energy harvesting units based on the context of the wireless energy harvesting IoT. The multiple sensor nodes are used for transmission of the data into common sin nodes. The sink nodes are also known as gateway, which is associated to network as well as reachable to the outlier globe over internet (Ashton, 2017). The wireless energy harvesting unit is received of transmitted radio with the antenna as well as converted of received RF energy into constant direct current energy sources for supplying of sensor devices. Into the framework of IoT, the wireless sensor networks along with the RFID tags are the wireless energy sources used for dedicated sources deploy for providing of energy supply to the devices. The sources are being optimized based on frequency as well as there is maximum power for meeting with the sensor devices needs (Chandrakanth et al., 2016). Sink nodes are example of such dedicated sources. There are various sources which are transmitted at various bands of frequency. The harvesting wireless energy at various bands of the frequency is complicated with the antenna needs as well as demand of the power converter. In this particular article, there is a brief description of the existing state of the IoT which is based on the wireless communication as well as networks.
Wireless Energy Harvesting for the Internet of Things
The second research paper is based on “Low-energy security: Limits and opportunities in the internet of things”, where the progress into the wireless technologies are being fixed with the device smallness that lead to the communicational fabric which encompasses from the automobiles and the environmental sensors (Trappe, Howard, & Moore, 2015). The IoT security identifies concerns related to the wireless ad hoc as well as sensor network security. Most of the security concerns are related to the IoT faces with identification on the privacy issues for the ad hoc wireless networks. In this research paper, different types of security threats within the IoT are being categorized such as: confidentiality where the wireless communication among the entities is susceptible with the confidentiality threats from the attackers snoop for the messages contents. There are also threats of integrity, authentication where the IoT devices are established with integrity, authentication at different levels (Al-Fuqaha et al., 2015). It requires of capability to authenticate the devices as well as message communications among the sensors as well as receivers, and it ensures of trust into the data values with the IoT systems.
The IoT includes an uncommon between systems administration of items, making their information more available to the more extensive Internet. A large number of these gadgets will be sent and overlooked, giving data in an unattended, semi-continual way with exceptionally restricted upkeep. In that capacity, the IoT subsumes the past also, isolate ideas of sensor systems, versatile systems, what is more, RFID frameworks; securing the IoT will need strategies that assist these zones in smart innovative ways. The energy related concerns are not being able to solve by use of other technologies instead of IoT (Ashton, 2017). The IoT devices are ranged from lower RFID transponders to resource the Smartphone as well as tablets, focused on the light resourced devices. There are lack of dynamics suggested that there are selective of encryption as well as transmission of achieve of energy economy by staging of the cryptographic processes when there is major of new data requires to replace. It is included of embedded wireless devices into unconnected world to which the resource paradigm is distinguished. The devices ate affordable as well as it is limited to the terms of the energy, size, and storage as well as computing.
References
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347-2376.
Ashton, K. (2017). That’Internet of Things’ Thing [J/OL].
Bakariya, P. S., Dwari, S., Sarkar, M., & Mandal, M. K. (2015). Proximity-coupled microstrip antenna for bluetooth, WiMAX, and WLAN applications. IEEE Antennas and Wireless Propagation Letters, 14, 755-758.
Benveniste, M. (2016). U.S. Patent No. 9,420,611. Washington, DC: U.S. Patent and Trademark Office.
Cao, Y. F., Cheung, S. W., & Yuk, T. I. (2015). A multiband slot antenna for GPS/WiMAX/WLAN systems. IEEE Transactions on Antennas and Propagation, 63(3), 952-958.
Chandrakanth, S., Venkatesh, K., Uma Mahesh, J., & Naganjaneyulu, K. V. (2014). Internet of things. International Journal of Innovations & Advancement in Computer Science, 3(8), 16-20.
Comer, D. (2015). Computer networks and internets. Pearson.
Cui, X. (2016). The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-68). Palgrave Macmillan, London.
Fafoutis, X., Di Mauro, A., Vithanage, M. D., & Dragoni, N. (2015). Receiver-initiated medium access control protocols for wireless sensor networks. Computer Networks, 76, 55-74.
Huang, H., Liu, Y., Zhang, S., & Gong, S. (2015). Multiband metamaterial-loaded monopole antenna for WLAN/WiMAX applications. IEEE antennas and wireless propagation letters, 14, 662-665.
Jabbar, A., Dell’Anno, M. J., & Pearlman, M. (2017). U.S. Patent No. 9,560,548. Washington, DC: U.S. Patent and Trademark Office.
Jia, D., & Deng, J. (2017, November). A quad-band antenna with easily controlled bands for wireless locations/WLAN/WiMAX/SATCOM applications. In Progress in Electromagnetics Research Symposium-Fall (PIERS-FALL), 2017 (pp. 780-785). IEEE.
Kamalinejad, P., Mahapatra, C., Sheng, Z., Mirabbasi, S., Leung, V. C., & Guan, Y. L. (2015). Wireless energy harvesting for the Internet of Things. IEEE Communications Magazine, 53(6), 102-108.
Mulani, T. T., & Pingle, S. V. (2016). Internet of things. International Research Journal of Multidisciplinary Studies, 2(3).
Thilina, K. M., Tabassum, H., Hossain, E., & Kim, D. I. (2015). Medium access control design for full duplex wireless systems: challenges and approaches. IEEE Communications Magazine, 53(5), 112-120.
Trappe, W., Howard, R., & Moore, R. S. (2015). Low-energy security: Limits and opportunities in the internet of things. IEEE Security & Privacy, 13(1), 14-21.