METHODS OF INFORMATION SECURITY IN WIRELESS NETWORKS
DOI:
https://doi.org/10.37943/AITU.2020.1.63687Keywords:
wireless networking, security, authentication, asymmetric encryption, mesh portal, standard, Cisco Systems, WEP algorithm, TKIP protocol, MIC mechanism, IEEE 802.11i standard, authentication, EAP protocols.Abstract
The development of information technology sets the task of improving the reliability of computer networks. To study the security of networks, it is necessary to study the creation of network protocols, network architectures, and ways to strengthen security when transmitting information resources over a network. Network attacks, failures, and the failure of network devices are key factors affecting the security of information transmission in wireless networks.This article discusses methods for protecting information in wireless networks, including standards for authentication, encryption, and security. There are several security standards, but this article describes the effectiveness of those standards and the key principles used in those standards. It also outlines the principles of standards that ensure the confidentiality and integrity of data. That is, the TKIP protocol generates a new secret key for each packet of data transmitted, and one static WEP key is exchanged for about 500 billion possible keys. It can be used to encrypt this data set. The key generation mechanism has been modified. It consists of three components: a 128-bit Basic Key (TC), a packet number (TSC) and a MAC address of the carrier. The TKIP also uses a 48-bit initialization vector. It is used to prevent repeated use of vector IV. The TKIP algorithm uses a 48-bit (TSC) packet calculation. It keeps increasing. Well, the new 16-bit TSC IV is introduced (Figure 4). Thus, a mechanism is created that can block attacks.
References
Vishnevskij V.M, Portnoj S.L. & Shahnovich I.V. “Enciklopedija WiMAX. Put' k 4 G”.Moskva:Tehnosfera,2009.
Shahnovich I.V. “Sovremennye tehnologii besprovodnoj svjazi”. Izdanie vtoroe, ispravlennoe i dopolnennoe. Moskva:Tehnosfera, 2006.
“Sistemy mobil'noj svjazi”. Uchebnoe posobie dlja vuzov / V.P. Ipatov, V.K. Orlov, I.M. Samojlov & V.N.Smirnov. pod red. V.P. Ipatova.
Barns K. Zashhita ot hakerov besprovodnyh setej / K. Barns, T. Bouts. & D. Lojd M.: DMK-Press, 2005. – 480 p.
Vishnevskij V.M. Shirokopolosnye besprovodnye seti peredachi informacii / V.M. Vishnevskij, A.I. Ljahov, S.L. Portnoj, I.L. & Shahovich. M.: Tehnosfera, 2005. - 592 p.
Yu.Vishnevskij V. Mesh-cera standarta IEEE 802.11s — tehnologii irealizacija / V. Vishnevskij, D. Lakoncev, A. Safonov & S. Shpilev // Pervaja milja.-2008.-№2.
Vladimirov A.A. Wi-fu: «boevye» priemy vzloma i zashhity besprovodnyh setej / A.A. Vladimirov, K.V. Gavrilenko. & A.A. Mihajlovskij — M: NT Press, 2005.-464 p.
Romanec Ju.V. Zashhita informacii v komp'juternyh sistemah i setjah / Yu.V. Romanec, P.A. Timofeev. & V.F. Shan'gin — M.: Radio i svjaz', 2001. — 376 p.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Articles are open access under the Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish a manuscript in this journal agree to the following terms:
- The authors reserve the right to authorship of their work and transfer to the journal the right of first publication under the terms of the Creative Commons Attribution License, which allows others to freely distribute the published work with a mandatory link to the the original work and the first publication of the work in this journal.
- Authors have the right to conclude independent additional agreements that relate to the non-exclusive distribution of the work in the form in which it was published by this journal (for example, to post the work in the electronic repository of the institution or publish as part of a monograph), providing the link to the first publication of the work in this journal.
- Other terms stated in the Copyright Agreement.