Network Security DA 2 Name-C. NAGASAI Date-10/04/22 Reg No-20BCI0089 Slot-G1+TG1 Enlist and Explain about the Real time Secured Wireless Networks in terms of its security and Performance. Solution: 1. WiFi Security: Wi-Fi security refers to the safeguarding of wirelessly linked devices and networks. Without Wi-Fi security, anybody with a computer or mobile device within range of the router's wireless signal may access a networking equipment such as a wireless access point or a router. Changing default passwords for network devices is a fundamental recommended practice for Wi-Fi security. The default administrator passwords on most devices are designed to make device setup simple. The default passwords set by device makers, on the other hand, may be easily obtained online. Simple but effective techniques to increase Wi-Fi security include changing the default passwords for network devices to more complicated passwords and updating them often. Other Wi-Fi network security measures include: The use of MAC addresses, which restrict access to a Wi-Fi network, is another fundamental technique to Wi-Fi security. (A MAC address is a one-of-a-kind code or number that is used to identify particular network devices.) While this method provides more security than an open network, it is still vulnerable to attacks from adversaries that use "spoof" or changed addresses. The usage of security protocols that use encryption is an increasingly prevalent approach of securing Wi-Fi networks and devices. Encryption in digital communications encrypts data and only allows authorized receivers to decipher it. VPNs are another way to secure your Wi-Fi network. Users may construct secure, identity-protected tunnels between unsecured Wi-Fi networks and the internet using them. A virtual private network (VPN) can encrypt a user's internet connection. It may also hide a user's IP address by assigning the user's traffic a virtual IP address as it goes through the VPN server. Performace: WiFi provides no bandwidth or latency guarantees or assignment to its users. It provides variable bandwidth based on signal-tonoise in its environment. The transmit power is limited to 200 mW, and likely less in your region, has a limited amount of spectrum in 2.4 GHz and the newer 5 GHz bands. It’s access points overlap in their channel assignment by design and access points and peers compete for access to the same radio channel. There is no such thing as "typical" WiFi performance. The operating range will vary based on the standard, location of the user, used devices, and the local radio environment. If you are lucky, and you are the only WiFi user, then you can expect high throughput, low latency, and low variability in both. But once you are competing for access with other peers, or nearby WiFi networks, then all bets are off—expect high variability for latency and bandwidth. 2. Bluetooth Security: Bluetooth's security is based on the usage of two distinct keys: an authentication key and an encryption key. The master key is the authentication key, whereas encryption keys are produced with each new session. Additional protection is provided via a random number created for each transaction. Should you wish to implement it yourself, the Bluetooth standard describes the fundamental encryption for data protection and the authentication process in detail. However, there are a slew of companies that offer comprehensive Bluetooth solutions on a single chip, with some of them including security in the hardware (or the entire Bluetooth stack, as National Semiconductor does with their Simply Blue modules). Performance: Unlike other wireless technologies, Bluetooth is intended to enable a broad range of feasible ranges between two devices, giving developers a lot of leeway in designing wireless solutions that best suit their desired use case. The effective range of a good Bluetooth connection is influenced by several critical parameters, including the following: Radio Frequency The radio spectrum spans 30 Hz to 300 GHz. The greater the range, the lower the frequency. The lower the frequency, however, the lower the data rate that it can accommodate. As a result, choosing a radio spectrum requires balancing range and data rate. Transmit Power A design tradeoff between range and power consumption is made when selecting a transmit power level. The higher the transmit power, the greater the likelihood of the signal being heard across longer distances and the greater the effective range. However, raising the transmit power increases your device's power usage. Consider transmit power to be the same as the loudness of your voice. The more away someone can hear you, the more energy it takes to talk loudly. Loss of Direction The decrease of signal intensity that happens while a radio wave travels through the air is known as path loss. Path loss, also known as path attenuation, is a natural phenomenon that happens over time and is influenced by the environment in which the signal is conveyed. Signals can be harmed by obstacles between the transmitter and the receiver. Attenuators can range from humidity and precipitation to glass, wood, metal, or concrete walls, windows, and other impediments, as well as metal towers or panels that reflect and scatter radio signals. 3. ZigBEE Security: The encryption of data using the network key is the core security provided by the ZigBee network. During the authentication procedure, this key is sent to the joining device.The network key is never sent unencrypted over the air. It's always encrypted with a pre-configured link key, but knowing the link key allows you to get the network key by capturing over-the-air packets using an IEEE802.15.4 packet sniffer programme. The network key's exposure might have a significant influence on the network's security and vulnerability to security attacks and breaches. As a result, the pre-configured connection key's selection and distribution are crucial. The ZigBee standard doesn't specify how the link keys should be distributed, thus it's up to each company to come up with a method that works for their devices. The user has the option of utilising an explicit 16-byte link key that is unique for each device or install codes, which are discussed later, to adequately safeguard the network key over-the-air. Performance: Zigbee has great dependability and latency that is less than 200 milliseconds, which is common for human-device contact. Unless the broadcast frequency is pushed too high, Zigbee networks operate well up to the 192 node networks we tested, at which point Zigbee displays significant latency. As networks grow in size, the additional hops and broadcast congestion cause some delay to rise. The delay over the network increases as the packet payload grows, however this has a lower impact when evaluating 5, 25, and 50 bytes of payload. When the broadcast interval is reduced to 1 second, the maximum latency increases, which may be problematic for some applications. 4. NFC Security: NFC does not have any built-in, hardware-based security features, according to security experts. NFC is nothing more than a communication medium between two devices. However, the narrow range of NFC acts as a security measure against hackers. An attacker would have to achieve a few key tasks in order to capture an NFC signal from thin air (a process known as eavesdropping).He'd have to get near enough first. Many NFC applications function at such close ranges that you almost have to touch your smartphone to an NFC item to make a connection. So a hacker would aim to rub up against unsuspecting folks on the metro and engage in some digital pickpocketing? The NFC functionalities on your phone, on the other hand, only activate when you want them to. When you use an NFC terminal to check out at a retail store, for example, the chip will activate. Even when your phone is in standby mode, the chip isn't functional. Even if a hacker happened to be close enough to you at the proper time, he'd still require a lot of luck. In terms of direction, NFC signals are quite sensitive. It's so delicate that even a little rotation of your phone will prevent it from reading a smart tag. In order for a hacker to steal your signal, he'd have to tilt the antenna of a hacking device at the exact proper angle. Performance: NFC standards are based on existing RFID standards such as ISO/IEC 14443 and FeliCa, and encompass communications methods and data exchange formats. ISO/IEC 18092 and the NFC Forum's definitions are among the standards. NFC provides one-way and two-way communication between endpoints, making it ideal for a variety of uses. NFC devices can be used as electronic ID cards and keycards. They're utilised in contactless payment systems, and they let you pay with your phone instead of or in addition to credit cards and electronic ticket smart cards. NFC/CTLS or CTLS NFC are other names for them, with contactless shortened as CTLS. NFC may be used to transfer tiny files like contacts, as well as to establish quick connections for sharing bigger media like images, movies, and other files. 5. WiMAX Security: WiMAX systems were built with security in mind from the start. The standard incorporates cutting-edge technologies for protecting user data and preventing illegal access, as well as protocol optimization for mobility. The WiMAX MAC has a privacy sublayer that handles security. To ensure privacy, user data is encrypted using cryptographic algorithms that have been demonstrated to be reliable. 3DES (Triple Data Encryption Standard) and AES (Advanced Encryption Standard) are also supported.The cipher's 128-bit or 256-bit key is created during the authentication step and is renewed on a regular basis for further security. To prevent illegal usage, WiMAX provides a flexible way of authenticating subscriber stations and users. The authentication system is based on the IETF EAP, which allows a range of credentials including username/password, digital certificates, and smart cards. The public key and MAC address of WiMAX terminal devices are stored in built-in X.509 digital certificates. WiMAX operators can utilise the certificates for device authentication and then add a username/password or smart card authentication layer on top. Performance: Mobile technologies are used by network operators with variable levels of channel capacity. Throughput (Mbps) is often divided by channel bandwidth to characterise performance in a bandwidth-neutral manner (MHz). The number of bits per second sent per cycle (b/s/Hz) is obtained as a consequence. Using a 20 MHz channel, the average download speed is around 30 Mbps (similar to IEEE 802.11g average throughput). This implies that each sector has about 30 Mbps of shared bandwidth available for download transmission. For example, if 20 users are connected to the network using the same sector and half of them are downloading data at the same time, each user will obtain an average download throughput of around 3 Mbps. WiMAX offers advanced quality-of-service capabilities that will assist network operators in regulating per-user performance fairly. As the WiMAX network matures, average performance will improve.