Telestra is a company that has been licensed to provide wired telecom services in Australia.
Exetel has been contracted to help the company select and implement a field service system.
The company’s goal is to give service technicians wireless access to its corporate network and an electronic library of technical manuals. This will reduce or eliminate the need to have a lot of books and drawings on hand, especially when servicing equipment underground or climbing up transmission towers.
The technicians will also be able immediately to access the records of all equipment and make updates. This will help avoid a lot of paperwork, as well as possible errors and omissions.
The company is struggling to decide which technology it will adopt, whether handheld cellular or tables with 3G/4G/5G internet access, and notebooks that have cellular cards.
Exetel asked for your assistance.
Compare and contrast three data encryption standards applicable to WiMAX networks.
Find out the security risks associated with WPAN technologies.
The following two research papers are available. Please take the time to reflect on Energy Harvest.
Worldwide Interoperability For Microwave Access (WiMax), refers to the provision of long-range wireless broadband access services.
It is capable of delivering both point-to–point and multipoint applications. Yang, 2014.
On the other side, it can be used to increase security at the point of transmission to last mile.
WiMax also uses three types of data encryption standards to protect both data and information.
WiMax employs Counter Mode using the Cipher Blockchaining Message Authentication Cod Protocol (CCMP), in order to encrypt traffic.
Advanced Encryption Standard is also used to secure data transmissions.
WiMx uses the following data encryption standard:
It was intended to replace the Data Encryption Standard algorithm as it is known by hackers to quickly figure out how to conquer in.
Triple DES was the recommended symmetric algorithm.
It uses three keys, each with 56 bits.
Guo and colleagues (2014) estimate that the total key length is 168 bits.
However, experts claim that 112 bits are included into 112 bits in the key qualitative that is more closely related to the process.
Despite gradually being eliminated, there is still triple DES that can be used to determine the process for a tried and true encryption solution for administrators as well as distinct projects.
The Government of USA, along with other organizations, recognizes the Advanced Encryption Standard AES as the standard.
Despite this particular fact, it’s a high degree of proficiency in 128-piece frame format.
AES (Advanced Encryption Standard) also uses keys of 192 and 256 bits for substantial obligation encryption purposes.
AES can be regarded as impenetrable against the attacks. This is except for making savage powers.
It attempts to separate messages from each possible combination in 128,192 and 256 bits (Huang, et al. 2013).
However, security experts can be trusted to make this process single-minded and to the end to be the right standard for encoding information in the private sector.
RSA is an open key encryption algorithm that can be used to scramble data sent over the Internet.
It is generally found on different strategies that are part of PGP and GPG programs.
However, it is different from the triple DE and RSA which can be viewed as an asymmetric algorithm because the keys are used.
The key is usually open to the public and includes the specific things that are used to scramble the message, as well as the private keys for decoding.
However, RSA encryption can be seen as a massive clump which is both aggravating and preparing energy to break.
It is essential to identify the most important WPAN technology, Bluetooth and Zigbee.
Additionally, Bluetooth technology is not secure.
It is also important to note that data integrity and confidentiality can be compromised (Dehwah et. al., 2015).
Bluetooth doesn’t provide any customer verification.
Bluetooth does not allow for authorization of Bluetooth devices. This can lead to explicit behavior by the connected devices.
DoS attacks can be very serious on Bluetooth devices when data and information are being transmitted.
There can be malicious external entry at the time the data is being transmitted.
However, sensitive data can be corrupted or damaged during wireless transmission.
Bluesnarfing, which is a threat to the technology, can be used to allow attackers to increase the use of Bluetooth enabled devices.
Additionally, it scans for the IMEI numbers of Bluetooth devices in order to connect through the procedure.
This is why it must connect with Bluetooth enabled mobile phones.
It is crucial for attackers to send span messages in addition to phishing mails. This can cause serious damage to mobile phones.
ZigBee provides security keys by wireless communication that is low-power and low-rate.
ZigBee security protocol ensures that the particular link between devices is maintained.
Additionally, physical attacks can be made against ZigBee radio due to frequency breach.
Data packers are used to collect data at the time of wireless communication. This can be breached within the network.
1st article by Shaikh, Faisal Karim and Sherali Zeadally.
“Energy harvesting through wireless sensor networks: A comprehensive overview.”
Renewable and Sustainable Energy Reviews 55 (2016): 1041-454.
The paper deals with energy use in Wireless Sensor Network.
This network has a large number static sensor nodes that aid in the low processing.
There are also many energy sources such as the Wireless Sensor Network or radio frequency based energy.
This includes both solar based and thermal energy, as well as flow based energy harvesting.
For the purpose of efficiently using energy, there are many approaches that have been described in this paper.
The other side is energy harvesting using unique sources that can cause damage to the environment.
However, the harvesting of energy from distinct sources could lead to the depletion or the loss of resources in the environment.
Long-lasting devices can drain energy, and consume more battery.
It is crucial to develop energy efficient, reliable systems, which can be beneficial to the specific users in the form ultra-energy efficient sensors.
The main challenges are overcome by the design and development of energy harvesting systems that can be used to power wireless sensor networks.
In order to maximize the energy harvested by wireless sensor networks, it’s important to remember that models with potential are possible.
It is important to recognize the problems that remain to be addressed in order to design cost-effective, efficient, and reliable energy harvesting solutions for the environment.
“Energy harvesting wireless communications: An overview of recent advances.
IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381.
The article will discuss new technologies that have been implemented in the energy harvesting sector.
There are many new developments in energy harvesting that can be applied to traditional energy harvesting.
But, modern techniques in energy harvesting are more effective.
It has resulted in increased initial costs for several energy sources, as well as depletion of natural resources.
In the current paper, several equations as also theories are discussed. The process uses both the conventional concept of energy harvesting and converts it into modern technology.
There is potential for enhancements in the traditional theories, which have been improved into modern techniques.
VLSI model allows us to understand the energy and complexity involved in decoding and encoding within the network.
Additionally, it provides energy to the wireless sensor nodes for harvesting energy from the man-made and nature environment.
It is a promising way to ensure the future of wireless networks, as well as self-sustainability and virtual operation with them (Tunca et. al., 2014).
It is crucial to use wireless networks for energy harvesting. This will allow wireless sensors networking to make many transformative changes (Rault Bouabdallah & Challal (2014)).
However, wireless networking should have the potential to minimize the use of conventional energy and be supported by it.
A survey of intrusion detection system in wireless sensor networks.
Decentralized energy and power estimation for solar-powered wireless sensor network.
Distributed computing in sensor systems (DCOSS), 2015 International Conference on, (pp.
Survey on wireless sensor networks in smart grid.
Computer Communications, Volume 71, pages 22-33.
Opportunistic flooding using low-duty wireless sensor networks with unstable links.
IEEE Transactions on Computers 63(11), 2787-2822.
Survey on the evolution of MAC protocols in wireless sensors networks:
The top-down assessment of energy efficiency in wireless sensor network:
Computer Networks, Number 67, 104–122.
A survey on distributed mobile sink routing in wireless sensor networks.
Wireless sensor networks.
Principles, Design, and Applications.