METHODS OF INFORMATION SECURITY IN WIRELESS NETWORKS

Authors

DOI:

https://doi.org/10.37943/AITU.2020.1.63687

Keywords:

wireless networking, security, authentication, asymmetric encryption, mesh portal, standard, Cisco Systems, WEP algorithm, TKIP protocol, MIC mechanism, IEEE 802.11i standard, authentication, EAP protocols.

Abstract

The development of information technology sets the task of improving the reliability of computer networks. To study the security of networks, it is necessary to study the creation of network protocols, network architectures, and ways to strengthen security when transmitting information resources over a network. Network attacks, failures, and the failure of network devices are key factors affecting the security of information transmission in wireless networks.This article discusses methods for protecting information in wireless networks, including standards for authentication, encryption, and security. There are several security standards, but this article describes the effectiveness of those standards and the key principles used in those standards. It also outlines the principles of standards that ensure the confidentiality and integrity of data. That is, the TKIP protocol generates a new secret key for each packet of data transmitted, and one static WEP key is exchanged for about 500 billion possible keys. It can be used to encrypt this data set. The key generation mechanism has been modified. It consists of three components: a 128-bit Basic Key (TC), a packet number (TSC) and a MAC address of the carrier. The TKIP also uses a 48-bit initialization vector. It is used to prevent repeated use of vector IV. The TKIP algorithm uses a 48-bit (TSC) packet calculation. It keeps increasing. Well, the new 16-bit TSC IV is introduced (Figure 4). Thus, a mechanism is created that can block attacks.

Author Biography

F. Shinasilova, Eurasian National University after name L.N. Gumilyov, Kazakhstan

Master of Information Security systems
shinassilovaf@mail.ru, orcid.org/0000-0002-0635-872X
Eurasian National University after name L.N. Gumilyov, Kazakhstan

References

Vishnevskij V.M, Portnoj S.L. & Shahnovich I.V. “Enciklopedija WiMAX. Put' k 4 G”.Moskva:Tehnosfera,2009.

Shahnovich I.V. “Sovremennye tehnologii besprovodnoj svjazi”. Izdanie vtoroe, ispravlennoe i dopolnennoe. Moskva:Tehnosfera, 2006.

“Sistemy mobil'noj svjazi”. Uchebnoe posobie dlja vuzov / V.P. Ipatov, V.K. Orlov, I.M. Samojlov & V.N.Smirnov. pod red. V.P. Ipatova.

Barns K. Zashhita ot hakerov besprovodnyh setej / K. Barns, T. Bouts. & D. Lojd M.: DMK-Press, 2005. – 480 p.

Vishnevskij V.M. Shirokopolosnye besprovodnye seti peredachi informacii / V.M. Vishnevskij, A.I. Ljahov, S.L. Portnoj, I.L. & Shahovich. M.: Tehnosfera, 2005. - 592 p.

Yu.Vishnevskij V. Mesh-cera standarta IEEE 802.11s — tehnologii irealizacija / V. Vishnevskij, D. Lakoncev, A. Safonov & S. Shpilev // Pervaja milja.-2008.-№2.

Vladimirov A.A. Wi-fu: «boevye» priemy vzloma i zashhity besprovodnyh setej / A.A. Vladimirov, K.V. Gavrilenko. & A.A. Mihajlovskij — M: NT Press, 2005.-464 p.

Romanec Ju.V. Zashhita informacii v komp'juternyh sistemah i setjah / Yu.V. Romanec, P.A. Timofeev. & V.F. Shan'gin — M.: Radio i svjaz', 2001. — 376 p.

Downloads

Published

2020-03-30

How to Cite

Shinasilova, F. (2020). METHODS OF INFORMATION SECURITY IN WIRELESS NETWORKS. Scientific Journal of Astana IT University, 1, 102–114. https://doi.org/10.37943/AITU.2020.1.63687

Issue

Section

Information Technologies
betpas
pendik escort anadolu yakasi escort bostanci escort kadikoy escort kartal escort kurtkoy escort umraniye escort
maltepe escort ataşehir escort ataşehir escort ümraniye escort pendik escort kurtköy escort anadolu yakası escort üsküdar escort şerifali escort kartal escort gebze escort kadıköy escort bostancı escort göztepe escort kadıköy escort bostancı escort üsküdar escort ataşehir escort maltepe escort kurtköy escort anadolu yakası escort ataşehir escort beylikdüzü escort