METHODS OF INFORMATION SECURITY IN WIRELESS NETWORKS

Journal Title: Scientific Journal of Astana IT University - Year 2022, Vol 1, Issue 1

Abstract

The development of information technology sets the task of improving the reliability of computer networks. To study the security of networks, it is necessary to study the creation of network protocols, network architectures, and ways to strengthen security when transmitting information resources over a network. Network attacks, failures, and the failure of network devices are key factors affecting the security of information transmission in wireless networks.This article discusses methods for protecting information in wireless networks, including standards for authentication, encryption, and security. There are several security standards, but this article describes the effectiveness of those standards and the key principles used in those standards. It also outlines the principles of standards that ensure the confidentiality and integrity of data. That is, the TKIP protocol generates a new secret key for each packet of data transmitted, and one static WEP key is exchanged for about 500 billion possible keys. It can be used to encrypt this data set. The key generation mechanism has been modified. It consists of three components: a 128-bit Basic Key (TC), a packet number (TSC) and a MAC address of the carrier. The TKIP also uses a 48-bit initialization vector. It is used to prevent repeated use of vector IV. The TKIP algorithm uses a 48-bit (TSC) packet calculation. It keeps increasing. Well, the new 16-bit TSC IV is introduced (Figure 4). Thus, a mechanism is created that can block attacks.

Authors and Affiliations

F. Shinasilova

Keywords

Related Articles

FEASIBILITY ANALYSIS OF AIR FLOATING DESIGN FOR ELECTRICITY GENERATION

In the past several decades, there were presented different innovative technologies rather than traditional wind turbines for renewable energy that uses wind kinetic energy and remains in the air through aerodynamic fo...

DEVELOPMENT OF THE STRUCTURE OF AN AUTOMATED SYSTEM FOR DIAGNOSING DISEASES

Today, the importance of information support for various medical technologies has increased significantly. The use of modern information technologies is becoming a critical factor in the development of most branches of k...

NEURAL NETWORK MODEL OF SOIL MOISTURE FORECAST NORTH KAZAKHSTAN REGION

Dealing with agriculture, it is valuable to know an amount of moisture in a soil and to know how to forecast the stored soil moisture within particular period. Forecasting the stored soil moisture works for planning an e...

DEFENDER-ATTACKER MODELS FOR RESOURCE ALLOCATION IN INFORMATION SECURITY

Today, information security in defender-attacker game models is getting more attention from the research community. A game-theoretic approach applied in resource allocation study requires security in information for su...

Integrated Anti-risk Management of Conflicts of a Scientific Project in a Behavioral Economics

The object of the research is the processes of managing uncertainties such as risks, conflicts, and factors of behavioral economics which may have negative consequences for a scientific project. The study has revealed...

Download PDF file
  • EP ID EP711329
  • DOI 10.37943/AITU.2020.1.63687
  • Views 100
  • Downloads 0

How To Cite

F. Shinasilova (2022). METHODS OF INFORMATION SECURITY IN WIRELESS NETWORKS. Scientific Journal of Astana IT University, 1(1), -. https://europub.co.uk/articles/-A-711329