METHODS OF INFORMATION SECURITY IN WIRELESS NETWORKS
Journal Title: Scientific Journal of Astana IT University - Year 2022, Vol 1, Issue 1
Abstract
The development of information technology sets the task of improving the reliability of computer networks. To study the security of networks, it is necessary to study the creation of network protocols, network architectures, and ways to strengthen security when transmitting information resources over a network. Network attacks, failures, and the failure of network devices are key factors affecting the security of information transmission in wireless networks.This article discusses methods for protecting information in wireless networks, including standards for authentication, encryption, and security. There are several security standards, but this article describes the effectiveness of those standards and the key principles used in those standards. It also outlines the principles of standards that ensure the confidentiality and integrity of data. That is, the TKIP protocol generates a new secret key for each packet of data transmitted, and one static WEP key is exchanged for about 500 billion possible keys. It can be used to encrypt this data set. The key generation mechanism has been modified. It consists of three components: a 128-bit Basic Key (TC), a packet number (TSC) and a MAC address of the carrier. The TKIP also uses a 48-bit initialization vector. It is used to prevent repeated use of vector IV. The TKIP algorithm uses a 48-bit (TSC) packet calculation. It keeps increasing. Well, the new 16-bit TSC IV is introduced (Figure 4). Thus, a mechanism is created that can block attacks.
Authors and Affiliations
F. Shinasilova
ANALYSIS OF THE EFFECTIVENESS OF THE USE OF ADAPTIVE TRAINING PLATFORMS IN SECONDARY VOCATIONAL EDUCATION
The article considers the tasks and features of mathematics training for students of secondary vocational education. Special attention is paid to the need to solve the problem of adaptation of students to the condition...
NEURAL NETWORK MODEL OF SOIL MOISTURE FORECAST NORTH KAZAKHSTAN REGION
Dealing with agriculture, it is valuable to know an amount of moisture in a soil and to know how to forecast the stored soil moisture within particular period. Forecasting the stored soil moisture works for planning an e...
MATHEMATICAL AND COMPUTER MODELS OF THE COVID-19 EPIDEMIC
The COVID-19 epidemic has gone down in history as an emergency of international importance. Currently, the number of people infected with coronavirus around the world continues to grow, and modeling such a complex system...
DESIGNING DIGITAL CONTROLLERS FOR A CONTROLLED PLANT
This paper report contains an explanation of how to design a digital controller using the Laplace Transform to z-Transform conversion method. The objectives are that the controlled system should track step input with a...
CONFIDENTIAL INFORMATION SECRET METHOD
The article deals with the issues of hiding text information in a graphic file. Most often, one or two least significant bits of the image pixels are modified. To do this, each byte of the secret message is divided into...