Comparison of DES, Triple DES, AES, and Blowfish encryption techniques
Questions:
1.Compare and contrast three data encryption standards for WiMAX networks?
2.Research the security challenges for any two examples of WPAN technologies.
3.Please give your critical reflection on the topic of Energy Harvest.
The implementation of security protocol is important for encrypting the network and secure it from external access. There are different cryptographic model which can be applied for the encryption of the wireless access points. The data encryption standards used in WiMAX for increasing the security can be applied in different layer of the network for reducing the risk of different types of network attacks.
The data encryption standard DES was designed based on the Lucifer (developed by IBM) and since it is an old encryption technique many attackers have exploited the weakness of the DES and thus it has become an insecure cipher and it has been developed as triple DES for increasing the security (Daemen & Rijmen, 2013). There are different data encryption techniques available other than the DES such as AES and Blowfish and they are compared with each other to find the best encryption standards that can be applied in the WiMAX network.
Two types of keys such as the symmetric and asymmetric keys can be used for the encryption of the plaintext to cipher text. In the symmetric key method the a single key is created during the encrypting and the decrypting of the plain text and it can be text, number and the key can be used by anyone for decrypting the cipher text to plain text. Using the symmetric key the encryption can be done quickly and it does not extra user involvement (Bhanot & Hans, 2015). The asymmetric encryption is used for generation of two keys, where one key act as a public key and the other is used as a private key. The private key is not available to the third party and is kept with the receiver for decryption. The public key is used for the decryption and the digital certificate is used for identification of the identity but it is much slower that the asymmetric key encryption and is also not flexible for transferring the encrypted message to another person.
The data encryption standard (DES) works with an encryption text of 64 bits using a 56 bits and the algorithm is applied in three phases, firstly the plain text is constructed for permutation of the bits and text x are based on the initial permutation that can be applied to x0 = initial permutation of x = L0 R0, where L0 is considered as the 1st 32 bits and R0 is considered as last 32 bits. In the second phase 16 iteration is used for a specific function and it is required to be included with substitution and permutation. It can be written as,
Symmetric and asymmetric encryption key methods
L?= R?– ? R? = L? – ? XOR f (R? – ? , K? )
Here, K act as the key feature and f act as the function.
In the final stage the permutation is inversed IP?¹ to 16 bit string L and R for obtaining the cipher text and the formula y = IP -1 ( R 16 L 16 ) is used for obtaining it. For the decryption of the cipher text the same algorithm is used but it is applied in reverse. In the triple DES the cipher text is created by running the DES algorithm for multiple times and three different keys are created first key is generated from the plain text, the second key is generated from the first key and the third key is generated from the second key (Miroshnik & Kovalenko, 2013). For the encryption of the key the following formula is used
C = EK3 (EK2 (EK1 (P))) and followed by the decryption formula
P = DK3 (DK2 (DK1(C))). The 3DES is more secured than the DES and can be implemented easily for securing the WiMAX.
In case of the AES standards the key size can be of 128, 192 and 256 in length and it is a replacement of the 3DES. Cipher blocks are used and the choosing of the block is dependent on the user or the requirement. Rijndael algorithm is used in AES and it is a combination of strong algorithm and thus the key generated is also strong. The twofish algorithm can also be used in AES for generation of the key but it can use block size of 128 and 256 bits. When the DES is compared with the AES algorithm it is found that the algorithm is created for overcoming the drawbacks faced in the DES. In 3DES the encryption is required to be switched after transferring 32 GB data for reducing the risk of data leak (Rawal, 2016). While the implementation of the AES in WiMAX would add extra security because it deciphering the data is difficult from the identical blocks. The 3DES process is a lengthy process because the same encryption is required to be repeated for multiple times but in case of AES the encryption requires shorter time. In case of the security of the WiMAX network the implementation of the AES would be best when compared with DES ad 3 DES.
Implementation of WiMAX network security
A comparison table is created for the comparison the popular encrypting algorithm such as:
Algorithm |
Developed by |
Size of Key |
Size of Block |
Structure of Algorithm |
Rounds |
Cracked |
Existing Cracks |
Suitability for WiMAX |
Suitability for 802.1 |
DES |
IBM 1975 |
56 bits |
64 bits |
Feistel Network |
16 |
Yes |
Brute force, linear and differential crypanalysis |
Yes |
Yes |
3DES |
IBM 1978 |
112 bits and 168 bits |
64 bits |
Fiestal Network |
48 |
No |
Theoretically possible |
Yes |
Yes |
Rijndael |
Joan Daemen & Vincent Rijmen 1998 |
128 bits, 192 bits and 256 bits |
128 bits |
Substitution permutation Network |
10, 12 and 14 |
No |
Attacks from side channels |
Yes |
Yes |
The wireless personal area networking technologies can be referred to as the use of the RFID application, wireless sensors technology implemented in the wireless network for sending and receiving the data packets. For the implementation of the wireless personal area network using the WiMAX the security of the network is required to be analyzed and the authentication, authorization, privacy and the security of the network is also considered. The ad hoc nature and the connectivity of the network is required to be considered for the development of a secure wireless network. The user is required to be identified for finding the functionality of the wireless personal area network. The gatekeeper functionality is required to be considered and different scenario is also required to be considered for fulfilling the AAA requirement in the network (Mahmood, Javaid & Razzaq, 2015). The global IP development and the possibility in the connectivity of the wireless network is required to be recognized for the implementation of the ad hoc routing and resolve the key issues in the network. The proposed conventions ought to be adjusted to particular application situations in WPAN – fundamentally for the mobile and the geographical point of view. The WPANs work inside a short range and (mostly) under the states of low portability. The mobile devices can be carried by the person under the range of the wireless network and involved in the collaborative computing with the other devices connected in the network. The system capacities must keep running on conveyed stage, as hubs may abruptly vanish or appear in the system bringing about changing system topologies. All things considered the network should stay undisrupted (Movassaghi et al., 2014). The portable hub ought to have the capacity to get to a settled system, (for example, Internet) or administrations, even though a few remote hops towards the system for reaching the access point. Giving Internet availability, some portable Internet strategies could be acknowledged (Kinnunen et al., 2016). The directing strategies keep up the network among the hubs/administrations, in spite of the versatility of the hubs. The interworking is also dependent on the routing and between the fixed and the ad hoc networks.
3. Critical Reflection on Energy Harvest
The wireless sensor networks are developed with the application of the internet of things and lot of attention is required to be given on the sensitive areas of the network. The main issue with the wireless sensor network is the limited energy and it can cause a bottleneck situation in the network (Shaikh & Zeadally, 2016). This energy harvesting is required to be applied in the network for removing the bottleneck situation and increase the efficiency and performance of the network. Different high performance energy harvesting system developed for the wireless sensor networks are analyzed for identification of the sources of energy harvesting that can be applied in the current network for increasing the performance of the network. There are different energy prediction models that are used for the maximizing the energy harvest and the challenges of the energy harvesting is also required to be analyzed for the preparation of the mitigation plan. An effective and cost efficient solution is required to be developed for the preparation of the wireless sensor network. Different sources of energy are analyzed in the paper such as wind, mechanical vibration, magnetic fields, wind, etc. There is a requirement to use the energy continuously and store it for future use and thus the energy harvesting system is required to be deployed. The Energy Harvesting Wireless sensor network challenges and opportunities are discussed in the paper and it is found that a proper planning is required to be made for designing the architecture (Shaikh & Zeadally, 2016). The architecture of the energy harvesting wireless sensor network consists of the energy harvesters that are used for converting the external energy into electricity, a management module to control the power, energy storage, radio receiver, sensor equipment, A/D convertor for digitizing the analog signal that are generated by the signal and makes the signal available for the microcontroller and a memory for storing the sensor information, code and the data related with the application. The hardware model of the wireless sensor network required for the application of energy harvesting. The energy that is gathered from the harvesting is directly used by the node and it can also be used for future use (Shaikh & Zeadally, 2016). The author stated that the main cause of the energy harvesting is for handling the situation when consumption of energy is more than the supply the energy stored in the buffer can be used. The buffers can be super capacitors or rechargeable batteries installed in the network for storing the power. The batteries and the super capacitors acts as a renewable and sustainable source of energy and the electrostatic and different techniques can be used for energy harvesting such as the mechanical energy harvesting, photovoltaic energy harvesting, thermal energy harvesting, wireless energy harvesting wind energy harvesting, biochemical energy harvesting and acoustic energy harvesting (Shaikh & Zeadally, 2016). The mechanical energy harvesting technique is used for the conversation of the mechanical energy into electrical energy and the energy is converted by displacing and oscillation of spring mounted mass component inside the harvester for converting it into electrical energy. The piezoelectric energy harvesting, electrostatic energy harvesting, electromagnetic energy harvesting and electromagnetic energy harvesting technique is used in the mechanical energy harvesting.
Energy harvesting in wireless sensor networks
The paper is based on the energy harvesting wireless communication and it contributes to the wide area of wireless harvesting communication and methodology used for development of a wireless sensor network. The WSN is researched and multiple wireless network are analyzed for the development of the paper and energy harvesting nodes in the network are also analyzed for analyzing the performance limits of the nodes connected in the network. The performance limits, scheduling policies and the resources allocated for the development of the network are compared with the stack design for finding the finding the energy consumption and conservation in the network. The medium used for the accessing the network components and internetworking issues are also highlighted in the paper (Ulukus et al., 2015). Different techniques has been demonstrated regarding the use of the sustainable energy for energy harvesting in the wireless network and the details of the cooperation of the information transfer and simultaneous energy is also discussed in the report. The potential model that can be deployed for energy harvesting and discussed according the scale of the network and the details of the coverage of the energy and the consumption of energy by the nodes are also analyzed and documented in the paper. There are different techniques available that can be applied for slow down the battery depletion and reduce the power consumption in the network. The power control technique can be applied on the duty-cycle based operation for controlling the power whereas switching off the components when they are not in use can be used in low power modes in the wireless transceiver for saving energy and increasing the efficiency of the network. The nodes can be kept in low power mode for reducing the energy consumption whereas sending the node in the sleep mode can create a risk of loss of data packets because the data packets are not received or sent when the node is in sleep mode (Ulukus et al., 2015). The duty cycle is used for expressing the ratio between the times when the node is powered on by the node is on sleep mode. Network protocols are required to be applied that could operate on low duty cycle and it can increase the efficiency of the wireless sensor network.
There are two drawbacks of management of power in the nodes that is the latency in the data is dependent on the energy efficiency and there are many emerging applications that can be requires power for lifetimes and the battery operated management system cannot be used. The leakage of the battery can also affect the network and different approach can be used for energy harvesting and the use of rechargeable batteries and super capacitors for storing the power. The energy harvesting system are composed of individual nodes and energy can be extracted from multiple sources are used for extraction of the energy and converting it into usable electric power (Ulukus et al., 2015). The author analyzed the architecture of the wireless sensor network and the capability of energy harvesting for the preparation of the paper. Different energy harvesting models are discussed and the different components used for energy harvesting is required to be analyzed for the implementation. The storage of the energy that are used for future use and the microcontroller used for processing the sensors and analyzing the memory for evaluation of the code and the application related data are used in energy harvesting. The different harvesting models are discussed and inclusion of multiple harvester and the conversion of the energy is also discussed in the paper. The leakage current in the energy harvesting system is discussed because it can affect the efficiency and performance of the wireless sensor network. A large amount of energy can be loosed due to the leakage and there are different factors that can affect the leakage such as operating temperature of the capacitor, the amount of energy stored, duration of the charge, etc (Ulukus et al., 2015). The combination of the rechargeable battery and the super capacitor can help in reducing the leakage scenario and increase the efficiency of the network. There are different battery models such as physical model, empirical model and abstract model available and it can be used for resolving the complexity of the model and it requires low computational resources and effort of communication
References
Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., & Huang, K. (2015). Energy harvesting wireless communications: A review of recent advances. IEEE Journal on Selected Areas in Communications, 33(3), 360-381.
Shaikh, F. K., & Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A comprehensive review. Renewable and Sustainable Energy Reviews, 55, 1041-1054.
Ahmed, I., Butt, M. M., Psomas, C., Mohamed, A., Krikidis, I., & Guizani, M. (2015). Survey on energy harvesting wireless communications: Challenges and opportunities for radio resource allocation. Computer Networks, 88, 234-248.
Akhtar, F., & Rehmani, M. H. (2015). Energy replenishment using renewable and traditional energy resources for sustainable wireless sensor networks: A review. Renewable and Sustainable Energy Reviews, 45, 769-784.
Amarasuriya, G., Liu, S., & Poor, H. V. (2016, July). Wireless energy harvesting massive MIMO relays. In Sensor Array and Multichannel Signal Processing Workshop (SAM), 2016 IEEE (pp. 1-5). IEEE.
Atallah, R., Khabbaz, M., & Assi, C. (2016). Energy harvesting in vehicular networks: a contemporary survey. IEEE Wireless Communications, 23(2), 70-77.
Basagni, S., Naderi, M. Y., Petrioli, C., & Spenza, D. (2013). Wireless sensor networks with energy harvesting. Mobile Ad Hoc Networking: The Cutting Edge Directions, 701-736.
Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications, 9(4), 289-306.
Bhatti, N. A., Alizai, M. H., Syed, A. A., & Mottola, L. (2016). Energy harvesting and wireless transfer in sensor network applications: Concepts and experiences. ACM Transactions on Sensor Networks (TOSN), 12(3), 24.
Bokhiria, J., Parvej, M. A., & Erol-Kantarci, M. (2016, March). Project-based approach in teaching energy-harvesting wireless sensor networks. In Integrated STEM Education Conference (ISEC), 2016 IEEE (pp. 22-25). IEEE.
Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media.
Ding, Z., Krikidis, I., Sharif, B., & Poor, H. V. (2014, June). Impact of channel state information on wireless energy harvesting cooperative networks with spatially random relays. In Communications (ICC), 2014 IEEE International Conference on (pp. 4072-4076). IEEE.
Ding, Z., Perlaza, S. M., Esnaola, I., & Poor, H. V. (2014). Power allocation strategies in energy harvesting wireless cooperative networks. IEEE Transactions on Wireless Communications, 13(2), 846-860.
Guruacharya, S., & Hossain, E. (2017). Self-Sustainability of Energy Harvesting Systems: Concept, Analysis, and Design. arXiv preprint arXiv:1702.01648.
Hakiri, A., Gokhale, A., Berthou, P., Schmidt, D. C., & Gayraud, T. (2014). Software-defined networking: Challenges and research opportunities for future internet. Computer Networks, 75, 453-471.
He, S., Chen, J., Jiang, F., Yau, D. K., Xing, G., & Sun, Y. (2013). Energy provisioning in wireless rechargeable sensor networks. IEEE Transactions on Mobile Computing, 12(10), 1931-1942.
Kamalinejad, P., Mahapatra, C., Sheng, Z., Mirabbasi, S., Leung, V. C., & Guan, Y. L. (2015). Wireless energy harvesting for the internet of things. IEEE Communications Magazine, 53(6), 102-108.
Kang, J., Yu, R., Maharjan, S., Zhang, Y., Huang, X., Xie, S., … & Gjessing, S. (2015). Toward secure energy harvesting cooperative networks. IEEE Communications Magazine, 53(8), 114-121.
Kim, S., Vyas, R., Bito, J., Niotaki, K., Collado, A., Georgiadis, A., & Tentzeris, M. M. (2014). Ambient RF energy-harvesting technologies for self-sustainable standalone wireless sensor platforms. Proceedings of the IEEE, 102(11), 1649-1666.
Kinnunen, S. K., Ylä-Kujala, A., Marttonen-Arola, S., Kärri, T., & Baglee, D. (2016, January). Internet of Things Technologies to Rationalize the Data Acquisition in Industrial Asset Management. In Proceedings of the International Conference on Data Mining (DMIN) (p. 73). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
Liu, Y., Mousavifar, S. A., Deng, Y., Leung, C., & Elkashlan, M. (2016). Wireless energy harvesting in a cognitive relay network. IEEE Transactions on Wireless Communications, 15(4), 2498-2508.
Lu, X., Wang, P., Niyato, D., & Han, Z. (2015). Resource allocation in wireless networks with RF energy harvesting and transfer. IEEE Network, 29(6), 68-75.
Mahmood, A., Javaid, N., & Razzaq, S. (2015). A review of wireless communications for smart grid. Renewable and sustainable energy reviews, 41, 248-260.
Miroshnik, M. A., & Kovalenko, M. A. (2013). Uses of programmable logic integrated circuits for implementations of data encryption standard and its experimental linear cryptanalysis. I???????i???-??????i ??????? ?? ???i???????? ?????????i, (6), 36-44.
Mishra, D., De, S., Jana, S., Basagni, S., Chowdhury, K., & Heinzelman, W. (2015). Smart RF energy harvesting communications: Challenges and opportunities. IEEE Communications Magazine, 53(4), 70-78.
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., & Jamalipour, A. (2014). Wireless body area networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1658-1686.
Naderi, M. Y., Nintanavongsa, P., & Chowdhury, K. R. (2014). RF-MAC: A medium access control protocol for re-chargeable sensor networks powered by wireless energy harvesting. IEEE Transactions on Wireless Communications, 13(7), 3926-3937.
Pierobon, M., Jornet, J. M., Akkari, N., Almasri, S., & Akyildiz, I. F. (2014). A routing framework for energy harvesting wireless nanosensor networks in the Terahertz Band. Wireless networks, 20(5), 1169-1183.
Rawal, S. (2016). Advanced Encryption Standard (AES) and It’s Working.
Rawat, P., Singh, K. D., Chaouchi, H., & Bonnin, J. M. (2014). Wireless sensor networks: a survey on recent developments and potential synergies. The Journal of supercomputing, 68(1), 1-48.
Shaikh, F. K., & Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A comprehensive review. Renewable and Sustainable Energy Reviews, 55, 1041-1054.
Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., & Huang, K. (2015). Energy harvesting wireless communications: A review of recent advances. IEEE Journal on Selected Areas in Communications, 33(3), 360-381.