Using block cipher technology both protects data

This preview shows page 8 - 10 out of 15 pages.

instead of the RC4 cipher or TKIP. Using block cipher technology both protects data within our network but also ensures integrity of messages as they travel through our network (Scarpati, 2017). The WPA2 protocol, supports two methods of methods of authentication, Personal and Enterprise. Under Personal mode of authentication, the encryption scheme uses pre-shared keys (PSK). The PSK acts as a preapproval code that is used as internal network validation, not requiring each user to authenticate individually using 802.11i IEEE standards (Arana, 2006). Enterprise mode, however, does require each user individually based on IEEE 802.1x standards. While it is recommended we upgrade our wi-fi security protocols to WPA2, to be FIPS 140-2 compliant, it is necessary to implement WPA2-Enterprise 802.1x authentication and key derivation which rely on FIPS approved algorithms (NIST, 2001). In addition to the wi-fi protocols already discussed, additional protocols must be considered such as Bluetooth, ZigBee, and the Worldwide Interoperability for Microwave Access (WiMax) protocols (Ray, 2017). First, the Bluetooth protocol sends data over short distances and is usually used by individuals on their personal devices such as cell phones, tablets etc. Using an ultra-high frequency (UHF) radio waves for data transfer and does not have a specific authorization protocol standard (Ray, 2017). Bluetooth is an excellent option due to its use of a low powered wireless signal that uses little battery to be successful. Unfortunately, with its
limited range of access, devices reliant on Bluetooth may encounter interruptions with connectivity due to this small coverage area. The ZigBee protocol was designed for M2M networks, offering an inexpensive option that requires low power (Ray, 2017). With 128-bit AES encryption, it is typically used in Mesh networks, which allow nodes to be connected together through multiple pathways,” (Ray, 2017). One benefit of a ZigBee network is its ability to conserve power, making it ideal for networks such as those in smart homes. One downside currently with ZigBee is its inability to communicate with other ZigBee devices. The WiMax protocol is a wide ranged protocol that has been used in the past by some cell phone carriers prior to LTE 4g network connections. WiMax has the ability to successfully have long range of communication, up to 30 miles, however its signal can faulter depending on if you are indoors or outdoors. With its unstable signal and with the introduction of LTE 4g, and the cost of acquiring and maintaining such a connection would far outpace that of its benefits offered. Based on the pros and cons of each protocol, it is recommended we proceed with the afore mentioned protocol, is best proceed with upgrading to WPA2. Bluetooth, ZigBee nor WiMax would be able to provide us with the combination of range, security and speed necessary for our organization to function successfully.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture