Tuesday, May 5, 2020

Journal On Selected Areas In Communications -Myassignmenthelp.Com

Question: Discuss About The Journal On Selected Areas In Communications? Answer: Introducation RSA: This cryptographic algorithm was designed by Rivest, Shamir and Adleman in the year 1977. It is a public key encryption standard. This algorithm makes the use of large integer numbers. According to this algorithm an individual will use one public and one private key. The sender will use the receivers public key to encrypt the message that will result in cipher text. The receiver will be able to read the message by decrypting the message using its own private key (Jonsson et al., 2016). RSA has invented the concept of digital signature. This algorithm is based on the problem of factorizing the product of two different large prime integers or numbers. RSA is a secured cryptographic algorithm. DES: Data Encryption Standard is a symmetric key algorithm. It was developed by the research team of IBM. Same keys are used for the purpose of encrypting as well as decrypting messages. Two techniques called diffusion and confusion are used in DES. There are sixteen rounds present in DES (ISLAM AZAD, 2014). The confusion technique uses XOR operation. The size of plain text is 64 bits. The key size used here is 56 bits. The Triple DES is more secure than DES as the message is first encrypted then it is decrypted and again it is encrypted (Barker Barker, 2012). AES: Advanced Encryption Standard was developed after DES and Triple DES. It has a simple design and low cost of memory as compared to DES. The speed of this algorithm is higher than the other algorithms (Karthik Muruganandam, 2014). Size of the plain as well as cipher text is same. It is a symmetric algorithm and uses identical keys for encrypting and decrypting messages unlike RSA. Encryption is done by substitution, shifting and mixing of bits. The message block size used in AES is 128 bits and there are three keys. AES is gives better performance as compared to DES. Security Challenges of WPAN Technologies Security Challenges of Bluetooth Technology: Bluetooth technology allows several wireless devices to connect over a short distance. The mobile phone users can turn on the Bluetooth options in their phones and pair with another device in order to share files and other documents. There are several security challenges that exist in this technology. Malicious codes enter the devices through a file and affect the system. Viruses can damage the system and misuse the valuable information present in the device. Bluesnarfing attack accesses personal photographs and details in an unauthorized manner (Minar Tarique, 2012). When the attacker is able to pair with other devices for the purpose of misusing data then it is called Bluejacking attack (Padgette, 2017). Backdoor hacking is a technique where the attacker accesses the data of a system secretly and the victim remains unaware of this unauthorized access. The private area network created by Bluetooth technology is prone to various security risks and attacks. Incorporating strong security policies will help to prevent such attacks. Security Challenges in ZigBee: ZigBee standard is used in private area networks or PAN. Remote controls, home automation and many other services like the retail services make use of ZigBee. The main security challenge in ZigBee is that the encryption key can get hacked. Sniffing attacks can take place where a monitor or device is able to capture the data exchanges that are taking place in the network (Zillner Strobl, 2015). There are several nodes in the network and one of the nodes can hide its identity for the purpose of attacking the encryption key and the data packets (Wang, Jiang Zhang, 2014). Injection attacks are also possible in ZigBee as the protocols present in ZigBee are not strong. This makes it vulnerable to different types of risks and threats. Critical Reflection on Energy Harvest Energy harvesting focuses on deriving or producing energy form external sources like kinetic energy, wind energy, thermal energy and solar energy. Hydro energy also plays a major role in harvesting energy. Energy can be conserved by this technique of energy harvesting. The wireless networks can store and use the derived energy. According to Ulukus et al. (2015), the nodes present in wireless networks should have the capability to harvest energy on its own. This will enable the nodes and the wireless devices of the network to gain and generate energy continuously. The concept of energy harvesting will benefit the people of future generation. The energy consumption level will fall by adopting this method. A balanced or controlled procedure can also be used for harvesting energy. This will involve the use of human made sources. The efficiency levels of the technologies used will vary. Technical concepts and methods can be applied for harvesting energy continuously. According to Ulukus et al. (2015), Gaussian noise and AWGN channel concept can be used for harvesting energy. The output of this process is the sum of noise and input. Ulukus et al. (2015) presented a concept where the main focus was in the integration of circuits and devices for energy harvesting and transferring purpose. According to Shaikh and Zeadally (2016), WSN technologies have limited energy. Energy efficient and high performance devices can be used for reducing or minimizing this problem. There are two main sources of energy like ambient sources and external sources. Shaikh and Zeadally (2016) said that the ambient sources are the cheapest source of energy. External sources can be explicitly used for the purpose of energy harvesting. Solar based technique can be used for the purpose of harvesting energy where the solar energy is utilized. RF based or radio frequency based techniques can also be used. Wind energy and hydro energy can be used for the purpose of generating electrical power or electricity. Electricity can be generated by using turbines. Falling water can be used for the purpose of harnessing energy. Shaikh and Zeadally (2016) also said that Seebeck effect can be can be applied for converting heat energy into electrical energy. Digital Cellular Handsets Slide note: The Telestra Company is engaged in providing wired telecommunication services across Australia. Their aim is to implement an advanced wireless field of system. Slide note: Cellular handset is a telecommunication device that takes the help of radio waves in order to transmit data wirelessly (Goggin, 2012) Cellular handset is accessible to all and therefore, it would be very beneficial to use it for accessing and displaying standard PC documents. References Barker, W. C., Barker, E. B. (2012). SP 800-67 Rev. 1. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. ISLAM, E., AZAD, S. (2014). data encryption standard.Practical Cryptography: Algorithms and Implementations Using C++, 57. Jonsson, J., Moriarty, K., Kaliski, B., Rusch, A. (2016). PKCS# 1: RSA Cryptography Specifications Version 2.2. Karthik, S., Muruganandam, A. (2014). Data Encryption and Decryption by using Triple DES and performance analysis of crypto system.International Journal of Scientific Engineering and Research, 24-31. Minar, N. B. N. I., Tarique, M. (2012). Bluetooth security threats and solutions: a survey.International Journal of Distributed and Parallel Systems,3(1), 127. Padgette, J. (2017). Guide to bluetooth security.NIST Special Publication,800, 121. Shaikh, F. K., Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A comprehensive review.Renewable and Sustainable Energy Reviews,55, 1041-1054. Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., Huang, K. (2015). Energy harvesting wireless communications: A review of recent advances.IEEE Journal on Selected Areas in Communications,33(3), 360-381.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.