Wireless protocol is the set of rules that determines set of rules that determine how data is transmitted between different devices. Essentially, it allows connected devices to communicates with each other, regardless of any differences in their internal processes, structure and design. There are many wireless protocols established these days but the main protocols are Bluetooth, WiMax and Zigbee. In this blog we willexplain about these protocols in shortly.
Bluetooth:
Bluetooth is described under IEEE 802.15.1 as a wireless communication technology which works under a limited space around a distance of 10 meters. Bluetooth works under the range of 2.4GHZ. to communicate with another Bluetooth device we need the another Bluetooth dvice using the same technology i.e. a special Bluetooth card. Generally 802.11 technology is used in the smart phones and laptops. Bluetooth uses FHSS( frequency Hopping Spread Spectrum) due which the interference is very less as compared to other wireless technologies. The data rate for the Bluetooth is up to 1mbps.
Bluetooth operate in three security models:
- Unprotected mode: No any encryption technique and authentication technique is used in this process.
- Service based mode: if a connection is made between the devices the security manager does the authentication which restricts access to device.
- MAC address Encryption: In service mode connecting is made first and authentication is done but in this case authentication is done before the connection is made.
Strength of Bluetooth:
- Bluetooth creates adhoc network without any wires and the connection is made very fast.
- The power consumption by Bluetooth is very less.
- The voice and data transfer can be made by Bluetooth.
- The Bluetooth frequency can pass through different obstacle such as walls.
- The interference is very less as compared to other technologies.
Security Weakness of Bluetooth:
- Bluetooth provides the communication system base on the Bluetooth devices address, blueoothdoensont provides orginalclient verification so this is the authentication problem in Bluetooth.
- Confidentiality:ONnly devices connected to the bluetooh should view the content but in some case it does not happen so the confidentiality is lost.
- Authorization: Authentication is very simple because the shared key can be suspected in one response.
Zigbee:It is an wireless technology which uses low power radio signal for Personal area network. It is an IEEE 802.15.4 which is mainly used to create the network which need low data transfer rate, and for secure networkingZigbee is mainly used in home automation, medical data collection, aloso used in wireless sensor networks, smoke alarms and mainly it is designed to small projects which uses low power and low bandwidth. It is mainly used for short distance which is about 20 meters and can be passed over long distance by intermediate devices in a mesh network.
Zigbee operate in a band of 2.4GHz worldwide but it runs in 784MHZ in china and 868 MHz in Europe and 915 MHz in Australia and USA. It is cheaper than Bluetooth and WIFI. Zig Bee supports tree, star and mesh networking.
Advantages of zibbee:
- It is not centrally controlled and load is distributed equally in every network.
- Setup is very easy
- Very easy to control the home appliances.
- The power consumption is very low.
Disadvantages of zigbee:
- It is not widely used protocol so high knowledge is require to operate the zigbee compliant devices.
- It is not secure as WIFI using system.
- It is easily attacked by unauthorized person.
- The range is very low so it cannot be used for outdoor communication system.
Security threats of ZIgbee:
Zigbee uses the symmetric key cryptography. It uses the three types of key i.e. Master key, Link key and network key.
Majority of the zigbee nodes are low battery powered so they have little memory and power, the weakness of the zigbee can be derived from this point. Zigbee uses symmetric key cryptography and and the memory is very less so the intruder can easily read the key from the memory. If the intruder have physical access to the device then they can he/she can easily access the security software of the zigbee. So the feature low power consumption is the main security weakness of the zigbee.
WiMAX:WiMAX stands for Worldwide Interoperability for microwave access which is wirless union dedicated in the advancement of 802.16 standards. It is designed for BWA( Broadband Wireless Network). According to WIMAX forum the main purpose of the WiMAX is to promote the thecompatibility of the devices which depends upon 802.16.
The data transfer for the WiMaX is 10Megabits per seconds for download and upload. The range is about 10km form the base station. Till 135 countries are using WiMAX which includes 455 WiMAX centers.
WiMAX is based on the MAN technology. The main working of the WiMAX is similar to the WIFI but it operates at the higher speed and over greater distance. It is mainly used in the pace where the wired infrastructure is difficult to develop.
Advantages of WiMAX:
- Only one station can serve thousands of user.
- It is much faster than other wired networks and WIFI.
- The transmission speed is 10Mbps with range of 10km.
- No any obstacles can stop the transmission of signals.
Disadvantages of WiMAX:
- For the longer connection line of sight is required.
- Interrupt of signal can occur due to the rain.
- The main problem with WiMAX is that other wireless device can cause interference.
- Big electrical power is required to operate.
Security issue of Wimax:
Authentication: WiMAXdoes not uses the authentication for base station or service provider thus the WiMAX network is susceptible to man in middle attack.
Denial of services: the intruder can force the base station to take the large number of handoffs and then lunch the Denial of service attack.
Eavesdropping: during the process of connection messages are sent in plain text and these message are properly authenticated so that the attacker can easily lunch the attack.