Monday, December 9, 2019

Wireless Sensor Networks Energy Harvesting â€Myassignmenthelp.Com

Question: Discuss About The Wireless Sensor Networks Energy Harvesting? Answer: Introducation AES: AES or Advanced Encryption Standard is considered to be a block cipher that is symmetric in nature. The government of U.S has chosen this for the protection of classified information. This standard is uses identical keys for the purpose of encrypting as well as decrypting the messages (Karthik Muruganandam, 2014). This standard can accept any block size that is 128 bits and three keys like 128, 192 and 256 bits. AES processes the whole block of data in a parallel manner in every round using the techniques of substitutions as well as permutations. DES: Data Encryption Standard is considered to be one of the key standards of encryption. This is also symmetric in nature (ISLAM AZAD, 2014). The sender as well as the receiver is aware of the keys. It was designed by IBM. The size of the key used by DES is 64 bits but the actual size is 56 bits because 8 bits are used for checking parity. DES is a public standard. Triple DES: This is an advanced form of DES. The main feature of this algorithm is that it makes the use of three keys (Barker Barker, 2012). The encryption technique that is used in Triple DES is same as that of DES but here it is repeated three times. The first key that is used for encrypting the data is of size 56 bits (Bhanot Hans, 2015). The second key that is used for decrypting the data is of size 112 bits and the third key that is again used for the purpose of encrypting the data is of size 168 bits. Security Challenges of WPAN Technologies Bluetooth: The Bluetooth technology is exposed to various security threats as well as risks. One of the main security issues is the Bluesnarfing attack where an attacker hacks into the Bluetooth network. The hacker gets an unauthorized access of the sensitive data present in the wireless devices and misuses the data (Minar Tarique, 2012). Bluetooth Technology is also vulnerable to Backdoor hacking where the devices that are not paired can still get access to the sensitive data of the devices. In the case of Bluejacking the attacker pretends to be someone else during the pairing process by renaming its own device (Padgette, 2017). The other devices can get harmed by pairing up with the attackers device. The Bluetooth technology is also vulnerable to any malware attacks. ZigBee: ZigBee is a WPAN technology and it is vulnerable to various security risks as well as threats. A knowledgeable attacker can hack a device that has ZigBee radio. When the attacker gets access to the device in a physical manner then it can be considered to be a physical attack. The devices encryption key is targeted (Zillner Strobl, 2015). Other types of attack involve attacking from a far or remote location where the attack tries to imitate a node that is present in the network (Wang, Jiang Zhang, 2014). The attackers aim is gain access to the key. Critical Reflection on Energy Harvest Energy Harvesting can be defined as a process where energy is derived from external or natural resources like wind energy and solar energy. The problem of energy limitation in case of WSN can be removed or reduced by the process of energy harvesting. The WSN contains energy nodes. If these nodes get depleted then the network will face issue and such issues can be overcome by harvesting mechanism. Various mechanisms can be used for the purpose of harvesting energy. The RF technique uses the radio waves in order to convert it into DC power. The solar technique uses the solar energy that is abundant in nature in order to harvest energy. The thermal technique uses the heat energy and converts it into electrical form of energy by the Seebeck effect. In case of flow based techniques of energy harvesting the rotational movement of turbines are used for generating electrical form of energy. The wind based technique is also used for the purpose of harvesting energy (Shaikh Zeadally, 2016). Hydro based technique uses the movement of falling water for harnessing energy. According to Ulukus et al. (2015), the use of energy harvesting concept will bring transformative changes in the wireless networking technology. The wireless networks will become sustainable by using the concept and techniques of energy harvesting. The nodes in the network can continuously acquire energy from the nature as well as from human made phenomenon. The present battery leakages consume electricity even when the battery is not being used. The network nodes need uninterrupted supply of power or energy which points out the requirement of energy harvesting in WSN. References Barker, W. C., Barker, E. B. (2012). SP 800-67 Rev. 1. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. Bhanot, R., Hans, R. (2015). A review and comparative analysis of various encryption algorithms.International Journal of Security and Its Applications,9(4), 289-306 ISLAM, E., AZAD, S. (2014). data encryption standard.Practical Cryptography: Algorithms and Implementations Using C++, 57. Karthik, S., Muruganandam, A. (2014). Data Encryption and Decryption by using Triple DES and performance analysis of crypto system.International Journal of Scientific Engineering and Research, 24-31. Minar, N. B. N. I., Tarique, M. (2012). Bluetooth security threats and solutions: a survey.International Journal of Distributed and Parallel Systems,3(1), 127. Padgette, J. (2017). Guide to bluetooth security.NIST Special Publication,800, 121. Shaikh, F. K., Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A comprehensive review.Renewable and Sustainable Energy Reviews,55, 1041-1054. Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., Huang, K. (2015). Energy harvesting wireless communications: A review of recent advances.IEEE Journal on Selected Areas in Communications,33(3), 360-381. Wang, C., Jiang, T., Zhang, Q. (Eds.). (2014).ZigBee network protocols and applications. CRC Press. Zillner, T., Strobl, S. (2015). ZigBee exploited: The good the bad and the ugly.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.