Thursday, December 5, 2019
WiMax Networks and WPAN Technologies
Question: Discuss about theWiMax Networks and WPAN Technologies. Answer: Introduction Data Encryption Standards for WiMax Networks There are a number of data encryption standards that are available and are applied in case of the WiMax Networks. The first standard that was developed is the Data Encryption Standard that is popularly known as DES. It was based on the Lucifer algorithm and since it was the first of its kinds there were a number of mechanisms that were developed to break in to the security that was provided with this standard. The second data encryption standard is 3DES which stands for triple DES. The encryption techniques that are present in this standard are similar to that of DES. However, it offers advances security due to the application of this standard thrice over the network so that it becomes difficult for the attackers and the intruders to break in to the security. The third standard is the Advances Encryption Standard which is abbreviated as AES and is advancement over DES. It offers improved encryption and data security so that the privacy and the security of the network and the information that is exchanged over the same are maintained all throughout. The only attack that has ever been made possible in this standard is the Brute Force attack. The combinations in this attack are huge in number of it becomes next to impossible for the attackers to succeed in this attack as well (Doe, 2016). Compare and Contrast Factor DES 3DES AES Developed The standard was developed and introduced in the year 1977 The standard was developed and introduced in the year 1978 The standard was developed and introduced in the year 2000 Key Length The key length in case of this standard is fixed at 56 bits There are three keys that are involved with this standard as K1, K2 and K3 of 168 bits. The length of K1 and K2 is the same as 112 bits (Aleisa, 2016) The key length in this standard can have three varying options as 128 or 192 or 256 bits Cipher Type Symmetric block cipher is used in this standard for data encryption Symmetric block cipher is used in this standard for data encryption Symmetric block cipher is used in this standard for data encryption Block Size The block size in this standard is fixed at 64 bits The block size in this standard is fixed at 64 bits The block size in this standard can have three varying options as 128 or 192 or 256 bits Level of Security Inadequate due to a number of security loopholes More secure as compared to DES and moderate security capability Very secure Cryptanalysis Resistance It is vulnerable to differential as well as the linear cryptanalysis It is vulnerable to differential cryptanalysis It is safe and secure against the differential as well as the linear cryptanalysis Possible Keys There can be a maximum of 256 keys in case of this standard There can be a maximum of 2112 or 2168 keys in case of this standard depending upon the key length that is selected There can be a maximum of 2128, 2192 or 2256 keys in case of this standard depending upon the key length that is selected Time required to check all the possible keys All the possible keys of 56 bit length can be checked in around 400 days if the speed is maintained at 50 billion keys per second All the possible keys of 112 bit length can be checked in around 800 days if the speed is maintained at 50 billion keys per second All the possible keys of 128 bit length can be checked in around 5x1021 years if the speed is maintained at 50 billion keys per second (Alanazi, 2010) Security Challenges in WPAN Technologies The two most popular and widely used WPAN technologies are Bluetooth and Wi-Fi. There are a number of security challenges that are present in these technologies and the two main challenges that are common to both of these technologies are as listed below (Wmich, 2016). The most common attack that is seen in case of Bluetooth and Wi-Fi is the Denial of Service (DoS) attack. It is an attack that hampers the availability of the information. It works by flooding the WPAN with a lot of unnecessary traffic that ultimately leads to the unavailability of the service. Bluetooth connections share the bandwidth with a number of other connections such as cordless phones and many others and thus are exposed to interference. The attackers make use of the same and cause the signal jamming. Bluesmack, Bluejacking and Bluestab are some of the popular DoS attacks in case of Bluetooth (Al-kfairy Ryke, 2016). Impersonation attacks are the second category of the attacks that are common in the two WPAN technologies. There are several occurrences in which the attackers impersonate as an authenticated entity and gain the trust of the user at the opposite end. It results in the acquiring of important and valuable information through unauthorized manner. These attacks impact the confidentiality and integrity of the information as the attackers succeed in gaining the hold of the information and then get the ability to misuse the same. Once the connections are authenticated due to the impersonation attacks, the attackers can also play with the user privileges or may add other unsafe connection in to the network. There can also be instances of the requests placed by the affected device to the other users in the network without the knowledge of the device owner. These impersonation attacks are more common in case of Wi-Fi connections as compared to the Bluetooth connections. However, the compromise on the security is the same in both the cases (Rajamohan, 2016). References Alanazi, H. (2010). New Comparative Study Between DES, 3DES and AES within Nine Factors. Retrieved 21 September 2016, from https://arxiv.org/ftp/arxiv/papers/1003/1003.4085.pdf Aleisa, N. (2016). A Comparison of the 3DES and AES Encryption Standards. Retrieved 21 September 2016, from https://www.sersc.org/journals/IJSIA/vol9_no7_2015/21.pdf Al-kfairy, M. Ryke, S. (2016). Bluetooth Security. Retrieved 21 September 2016, from https://www.ida.liu.se/~TDDD17/oldprojects/2008/projects/10.pdf Doe, P. (2016). Comparison between DES, 3DES, AES and Blowfish (Data Encryption Algorithms). Bright Hub. Retrieved 21 September 2016, from https://www.brighthub.com/computing/smb-security/articles/75099.aspx Rajamohan, P. (2016). Analysis and Issues of Wireless Protocols Standard Suits in WPAN. Retrieved 21 September 2016, from https://www.ijcnwc.org/papers/vol4no42014/2vol4no4.pdf Wmich,. (2016). Wireless Personal Area Networks (WPANs). Retrieved 21 September 2016, from https://cs.wmich.edu/~alfuqaha/Fall09/cs6030/lectures/WPAN.pdf
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.