Sunday, December 8, 2019

Energy Harvesting Wireless Communications †Myassignmenthelp.Com

Question: Discuss About The Energy Harvesting Wireless Communications? Answer: Introducation Data Encryption Standard (DES) ciphers was approved as one of the standard. It is identified that data encryption standard algorithm (DEA) is one of the network block cipher that mainly utilizes key length of 56 bit and 64 bit block size. DES cipher is one of the standards among various governments all around the world including the U.S government until it became possible to crack in less than 24 hours by utilizing brute force attacks (Hassan Bach, 2014). Therefore, DES is considered outdated as well as less secured. It is very much important to improve DES. In order to improve the problem, due to which DES is considered outdated, Triple Data Encryption Standard is created. The previous 64 bits keys of DES are now replaced with the help of 192 keys, which are three much as compared to DEA (Zahurul et al., 2016). This longer length of the key helps in providing proper defense against brute attack of force and despite of cracking it theoretically, it is not much practical to crack the entire TDES by utilizing appropriate modern technology. Thus, it is identified that a reputation of being secure helps in making it much more popular for financial transactions. On the other hand, generalized DES scheme is one of the variant of DES that is mainly designed in the intention of speeding the entire process of encryption while improving the security. It mainly helps in generalizing that Feistel network structure that is related with DES uses larger block sizes (Zhang et al., 2014). In each of the round, the DES round function is mainly applied to the rightmost block and therefore it is XORED with other parts. Then the entire block is rotated 32 bits to the right. The G-DES scheme mainly comprises of sub block that are mainly chained with the help of XORS. It mainly follows rotation to the right of the block for the next turn. Thus, it is identified that G-DES can helps in processing larger number of bits to the original number of calls to DES. It is identified that G-DES is very much robust variant as compared to DES and thus it increases the speed in context to encryption at the expense of security. Research security challenges for the two examples of WPAN technologies A wireless personal area network (WPAN) is one of the personal, short distance area networks that help in interconnecting devices that are generally centered on an individuals workplace. It is identified that the most common examples of WPAN technologies are Bluetooth and Zigbee. The security challenges for the two examples of WPAN technologies are provided below: Security challenges for Bluetooth: The security issues that are related with Bluetooth must be taken into serious consideration. The most significant risk that is present within the wireless technology is that the medium of underlying communication is open for everyone including intruders as well as authentic users (Misra et al., 2015). Therefore, the intruders can utilize the Bluetooth technology for getting access. It is identified that number of malicious entities generally gains unauthorized access with the help of wireless connections, bypassing any of the wireless protection. The malicious entities can be able to violate the legitimate privacy of the various users and can be able to track their activities (Sagstetter et al., 2013). If the attackers connect their headset with the help of mobile phone and hacks the frequency then they can be able to bug any individuals phone and as a result the person will face problem. The other type of security issues that are related with Blue tooth include denial of service attacks, eavesdropping as well as resource misappropriation. It is found that viruses as well as other malicious code can also corrupt data on the wireless device like Bluetooth when they are introduced to a wired network. Security challenges of Zigbee: There are number of security concerns that are related with Zigbee protocol. The first vulnerability that is related with Zigbee network is key distribution as various security keys are mainly transmitted either into the devices or over the air in a quite unsecure way (Barki et al., 2016). By utilizing high security level, the various network key that is encrypted as well as transmitted uses master key that is shared among different nodes. Thus, it creates entrusted relationship between various communication devices within the network. Another security weakness that is related with Zigbee model is that the forward requirement of security is not addressed appropriately. It is identified that in Zigbee enabled systems number of security vulnerabilities are identified (Lee et al., 2014). The main weaknesses in the security mechanism of Zigbee are directly derived from various limited resources, as majority of them are battery powered with little computing power as well as memory. Critical reflection on Energy Harvest I have identified that recently, the wireless sensor networks have attracted the attention of many due to the presence of pervasive nature and the capability of their deployment in various fields including cyber physical system, internet of things as well as in various emerging areas. It is analyzed by me that the limited energy association that is present within the WSNs creates major bottleneck within the technologies that are related with WSN. In order to overcome, the limitation, both the design as well as development, harvesting system related with WSN is utilized and it is found that the systems are very much efficient as well as high performing. The current state of the wireless network is mainly comprises of various energy harvesting nodes starting from performance limit of theoretic information to different transmission scheduling procedures. It is identified that various self-sustaining network related with harvesting wireless is considered as they mainly covers both the en ergy cooperation aspects and information transfer. I have found that number of potential models helps in reviewing the consumption of nodes within the energy harvesting at various network scales. A comprehensive taxonomy of different sources of energy harvesting is utilized generally with the help of WSNs. In order to maximize the capacity of energy harvesting within WSN, various energy prediction models are required. I have analyzed that the widespread utilization of various wireless sensors as well as the management of energy resources are researched. Wireless sensors mainly utilize batteries for supplying power but in some of the application, it is identified by me that the replacement of battery can become cumbersome and it mainly requires lot of time. Both this factor can hamper or affect the entire monitoring of the procedure. It is very much important to harvest the energy from various sources in nature for wireless sensors. Alternative sources of energy can be utilized for addressing the feasibility of the various wireless networks as well as wireless sensor. Finally, I have found that energy harvesting deals with number of challenges that needs to be resolved as soon as possible. This help in enhancing as well as developing cost-effectiveness, reliability, efficiency as well as energy harvesting for WSN environment. References Barki, A., Bouabdallah, A., Gharout, S., Traor, J. (2016). M2M security: Challenges and solutions.IEEE Communications Surveys Tutorials,18(2), 1241-1254. Hassan, A., Bach, C. (2014, April). WiMAX Basics From Deployments to PHY Improvements. ASEE. Lee, C., Zappaterra, L., Choi, K., Choi, H. A. (2014, October). Securing smart home: Technologies, security challenges, and security requirements. InCommunications and Network Security (CNS), 2014 IEEE Conference on(pp. 67-72). IEEE. Lu, X., Wang, P., Niyato, D., Hossain, E. (2014). Dynamic spectrum access in cognitive radio networks with RF energy harvesting.IEEE Wireless Communications,21(3), 102-110. Misra, P., Raza, S., Rajaraman, V., Warrior, J., Voigt, T. (2015). Security challenges in indoor location sensing using bluetooth LE broadcast.ewsn 2015, 11. Rodriguez, A. N., Cruz, F. R. G., Ramos, R. Z. (2015). Design of 900 Mhz AC to DC converter using native Cmos device of TSMC 0.18 micron technology for RF energy harvest application.Univers J Electr Electron Eng,3(7). Sagstetter, F., Lukasiewycz, M., Steinhorst, S., Wolf, M., Bouard, A., Harris, W. R., ... Chakraborty, S. (2013, March). Security challenges in automotive hardware/software architecture design. InProceedings of the Conference on Design, Automation and Test in Europe(pp. 458-463). EDA Consortium. Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016): 1041-1054. Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381. Zahurul, S., Mariun, N., Grozescu, I. V., Tsuyoshi, H., Mitani, Y., Othman, M. L., ... Abidin, I. Z. (2016). Future strategic plan analysis for integrating distributed renewable generation to smart grid through wireless sensor network: Malaysia prospect.Renewable and Sustainable Energy Reviews,53, 978-992. Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., ... Zhang, B. (2014). Named data networking.ACM SIGCOMM Computer Communication Review,44(3), 66-73.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.