Introduction to WiMax and Data Encryption Standards
Worldwide Interoperability for Microwave Access is a wireless network that is dedicated to the advancement of IEEE 802.16 standards. Wimax is based on wide area network and offers a faster speed in comparison to WiFI. The common term for Wimax is 4G and is quite popular across the world. It is a technology that offers a long range wireless networking for mobile and fixed connection as well. This technology is adopted by many people across the world and therefore, proper security of this network is a must need. The most common encryption standards that are used in WiMax technology is 3DES or triple data encryption standard, AES or Advanced encryption standard and RSA (Thambiraja, Ramesh & Umarani, 2012). There are certain differences between these three encryption algorithms the basic one being the difference in the encryption keys that are used in the encryption algorithm. In 3DES, three keys of 56 bits each are used in encryption; in AES, 128 bit, 192 bit and 256 bit encryption keys are used. RSA on the other hand make use of both public and private keys for encryption and decryption. These three encryption standards has certain contrasting characteristics, which are discussed below-
Characteristic Features |
Triple Data Encryption standard |
Advanced Encryption Standard |
RSA |
Definition of the standard |
3DES is the advanced version of traditional data encryption algorithm. It is a type of symmetric block cipher that runs the traditional data encryption algorithm three times on a particular block of data and thus it is more secure that the traditional algorithm. |
Advanced encryption algorithm is a symmetric block cipher that allows block length of only 128 bits and key lengths of 128, 192 and 256 bits for encryption. |
The RSA encryption standard is a public key encryption technology that makes use of prime factorization for encryption of a particular data (Singh, 2013). |
The Required Key Size For Encryption |
Since this algorithm applies the traditional DES algorithm, three times on a particular data, it makes use of three keys, of 56 bits each. |
The key sizes in AES are 128 bits, 192 bits and 256 bits (Aleisa, 2015). |
RSA is a public key encryption standard and therefore make use of 2048 bit keys |
The Required Computation Time for Encryption |
The speed of encryption is highest in 3DES in comparison to the other two algorithms and therefore the computation time is least in the same (Adhie et al., 2018). However, the speed of computation of AES is quite similar to 3DES. |
The computation speed is higher in comparison to RSA |
The speed of encryption in least in RSA as it is the most time consuming method of encryption |
Performance Level |
3DES is an advanced form of DES with improved performance |
AES is the best encryption algorithm in comparison to RSA and 3DES |
There are certain performance lags associated with RSA. |
Memory Usage |
Memory usage is less in comparison to RSA encryption standard but is higher than AES |
AES makes use of considerably lesser memory in comparison to 3DES and RSA. |
Memory usage is quite high in RSA. |
Table 1: Showing the differences among 3DES, AES and RSA
Shared wireless medium provides a channel for information transfer in a shared medium. The rate of data flow is slower in a shared medium mainly because of the possible collisions. The coordination of traffic is therefore essential in order to reduce or eliminate the possibility of collisions in shared wireless medium (Younus, Fazlul & Islam, 2015). Since the collision is the main reason for the delays that are faced in the wireless networks, it is needed to be addressed.
In shared wireless medium, the traffic is coordinated with the help of Carrier Sensed Multiple Access or CSMA technology (Laufer & Kleinrock, 2016). This technology is mainly used to the shared network topologies such as Ethernet in order to control the access to the particular wireless network. This technology is mainly used for collision detection and is notably used on wireless technology. This technology is used in controlling the traffic in shared wireless medium as it make use of carrier sensing for deferring the active transmissions in wireless medium until no other stations are transmitting and the channel is free. It further helps in detection of the collision in the channel, which in turn helps in coordinating the traffic of a shared wireless medium. Prevention of collision or reducing the number of collision in a network is a must need. CSMA controls the traffic by stopping the transmission of the frame and in turn transmitting a jam signal (Sen, Choudhury & Nelakuditi, 2012). The channel then waits for a particular or a random time interval before resending the frame.
Apart from CSMA, there are certain additional methods that can reduce the collisions in shared wireless medium. These are RTS and CTS techniques that are capable of implementing a virtual carrier sensing for collision avoidance in shared wireless medium (Sahoo, Rath & Puthal, 2012). Request to Send and clear to send is optionally used in mediating the access in shared medium in order to detect or avoid collision. In this method, a node can send only if it receives a CTS signal. The node can receive a CTS signal only if it has generated a RTS or request to send signal. On sending the request to send signal, to the receiver, the sender waits for the CTS signal before transmitting the packet in the wireless medium. This reduces the chances of collision thereby helping in traffic control in shared wireless medium. This method can however, result in subsequent delays in transmission of data and therefore, CSMA is supplemented by RTS/CTS only when required.
Methods of Traffic Coordination in Shared Wireless Medium
In the past several years, there has been a rapid development in the field of wireless networking. The development of ZigBee technology is one of the results of the increasing demand for low data and low power networking applications. The ZigBee technology was mainly developed for the wireless personal area networks and is mainly used in the military applications. The devices with the backbone of ZigBee technology mainly operates in the frequency scale of 868 MHz, 915 Mhz and 2.4 GHz frequency bands (Elarabi, Deep & Rai, 2015).. The maximum data rate that can be achieved with the ZigBee technology is 250K bits per second. ZigBee can be further discussed as a specification for high level communication by making use of small, low power and low cost radios.
The use of internet of things has considerably increased over the years. The Internet of things is a technology that remained unexplored for many years. According to Zorzi et al., (2010) the current situation of the many intranet of things should evolve in a much more integrated and heterogeneous system. Although the term internet of things was coined more than 10 years ago, the technology could be explored only in recent years. With the increase in adoption and use of IOT devices, it is expected that there will be certain improvements even in the unexplored territory of Internet of things. The theme of internet of things can be seen as the concept that has originated from the different converging topics. For example, the radio frequency identifiers were originally introduced in order to overcome the limitations of the barcode technology. There has been a considerable development in the field of RFID technology. The researches associated with the RFID are slowly growing together as the sensor and the sensor nodes in RFID are becoming smaller and highly integrated. The recent RFID tags are equipped with more computing power and storage capacity. Therefore, it can be predicted that current state of IOT will see further improvement in recent years.
References
Adhie, R. P., Hutama, Y., Ahmar, A. S., & Setiawan, M. I. (2018, January). Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC). In Journal of Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.
Aleisa, N. (2015). A Comparison of the 3DES and AES Encryption Standards. International Journal of Security and Its Applications, 9(7), 241-246.
Bhattacharyya, B., & Bhattacharya, S. (2013). Emerging Fields in 4G Technology, its Applications & Beyond-An Overview. International Journal of Information and Computation Technology, 3(4), 251-260.
Elarabi, T., Deep, V., & Rai, C. K. (2015, December). Design and simulation of state-of-art ZigBee transmitter for IoT wireless devices. In Signal Processing and Information Technology (ISSPIT), 2015 IEEE International Symposium on(pp. 297-300). IEEE.
Gohil, A., Modi, H., & Patel, S. K. (2013, March). 5G technology of mobile communication: A survey. In Intelligent Systems and Signal Processing (ISSP), 2013 International Conference on (pp. 288-292). IEEE.
Kumar, U., Kim, J., & Helmy, A. (2013, September). Comparing wireless network usage: laptop vs smart-phones. In Proceedings of the 19th annual international conference on Mobile computing & networking (pp. 243-246). ACM.
Laufer, R., & Kleinrock, L. (2016). The capacity of wireless CSMA/CA networks. IEEE/ACM Transactions on Networking (TON), 24(3), 1518-1532.
Osseiran, A., Boccardi, F., Braun, V., Kusume, K., Marsch, P., Maternia, M., … & Tullberg, H. (2014). Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Communications Magazine, 52(5), 26-35.
Patel, S., Chauhan, M., & Kapadiya, K. (2012). 5G: Future mobile technology-vision 2020. International Journal of Computer Applications, 54(17).
Sahoo, B. P. S., Rath, S., & Puthal, D. (2012). Energy efficient protocols for wireless sensor networks: A survey and approach. International Journal of Computer Applications, 44(18), 43-48.
Sen, S., Choudhury, R. R., & Nelakuditi, S. (2012). CSMA/CN: carrier sense multiple access with collision notification. IEEE/ACM Transactions on Networking (ToN), 20(2), 544-556.
Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. International Journal of Computer Applications, 67(19).
Thambiraja, E., Ramesh, G., & Umarani, D. R. (2012). A survey on various most common encryption techniques. International journal of advanced research in computer science and software engineering, 2(7).
Younus, M., Fazlul, A. K. M., & Islam, M. Z. (2015). Performance Analysis of CSMA/CA in Wireless Local Area Network. International Journal of Computer Applications, 120(10).
Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today’s intranet of things to a future internet of things: a wireless-and mobility-related view. IEEE Wireless Communications, 17(6).