Wednesday, May 6, 2020

Energy Harvesting Wireless Communications †Free Samples to Students

Question: Discuss about the Energy Harvesting Wireless Communications. Answer: Introduction The report will highlight Wi-Max encryption methods, WPAN security challenges, two journal articles reviews and Telestra getting benefits from the wireless cellular network. PKMv2: This protocol has the varied properties and it contains the mutual authentication. This mutual authentication is carried out by integrating the message integrity algorithms, EAP-based protocols and RSA-based protocols, and key management protocols (Sharma Singh, 2017). The protocol is utilized for the authentic exchange of the cryptographic keys for broadcast traffic and multicast traffic. AES: Advanced Encryption Standard is based on Rijndael algorithm. This encryption method is agile and can be configured with ease. It also requires less memory compared to all other encryption standards like PKMv2 or 3DES. Thus all of them prefer this key because of all these advantageous features. The algorithm works on the 128-bit block size of data and this block size of data are arranged in a 4x4 array of bytes and this arrangement is called state. This standard is used to encipher over the air traffic. EAP: EAP protocol is used to connect a computer to the Internet, the authentication procedure that is used and supported by EAP are public key encryption authentication, token cards, smart cards and one-time passwords. The user requests for connection to the wireless network via an access point (Sharma Singh, 2017). The access point asks for ID from the user and transfers data to the authorized users server. Wireless Personal Area Network and its security challenges DDoS attacks: DDoS attacks sabotage one's computer and take the ownership of the computer system thus steal the sensitive information of the computer this kind of attack is very common and this attack generally occurs in insecure wireless personal area network (Achary Lalseta, 2017). The customers may be unaware that their system has been hacked, when they try to enter their system they will find out that their database and the system have been hacked. This can also lead to the shutdown of one's server computer as well. Malware attack: The intruders attack ones computer system via insecure network via virus attacks. The virus installed into ones system can steal ones data, can alter ones data and can even destroy ones files resides in the customer data as well. First paper review: Wireless Sensor Networks is gaining prominence due to the enhancement of Internet of Things as well as Cyber-Physical Systems. In this paper, the effective harvesting system to use the power of WSN technology for WSN environment has been showcased. Various energy predictions models have been prescribed in this paper that has the capability to embellish the energy harvested in Wireless Sensor Network (Shaikh Zeadally, 2016). This paper has also highlighted the issues that need to be detected to embellish the harvesting system for the WSN environment so that the system can be utilized in profitable and effective manner. Second paper review: This paper has highlighted the energy that is harvesting the wireless communications. All the aspects of the wireless networks like network issues, energy harvesting nodes, transmission scheduling policies, resource allocation and harvesting nodes elaborately (Ulukus et al., 2015). Various models associated with harvesting nodes have been detailed with respect to various network scales. Conclusion Wi-Max encryption procedures have been well illustrated in this report. The security challenges associated with WPAN technologies have been showcased too. The two articles have been reviewed as well. A presentation has been well demonstrated stated the benefits that Telestra can acquire from the wireless cellular network. References Achary, R., Lalseta, J. S. (2017). Internet of Things: Essential Technology, Application Domain, Privacy and Security Challenges.International Journal of Computer Applications,157(6). Shaikh, F. K., Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A comprehensive review.Renewable and Sustainable Energy Reviews,55, 1041-1054. Sharma, S., Singh, H. (2017). An Effectual Approach for Security and Integrity against Wicked Node Attacks in Wi-Max Network Environment.Indian Journal of Science and Technology,10(27). Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., Huang, K. (2015). Energy harvesting wireless communications: A review of recent advances.IEEE Journal on Selected Areas in Communications,33(3), 360-381.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.