METHODS OF INFORMATION SECURITY IN WIRELESS NETWORKS

Journal Title: Scientific Journal of Astana IT University - Year 2022, Vol 1, Issue 1

Abstract

The development of information technology sets the task of improving the reliability of computer networks. To study the security of networks, it is necessary to study the creation of network protocols, network architectures, and ways to strengthen security when transmitting information resources over a network. Network attacks, failures, and the failure of network devices are key factors affecting the security of information transmission in wireless networks.This article discusses methods for protecting information in wireless networks, including standards for authentication, encryption, and security. There are several security standards, but this article describes the effectiveness of those standards and the key principles used in those standards. It also outlines the principles of standards that ensure the confidentiality and integrity of data. That is, the TKIP protocol generates a new secret key for each packet of data transmitted, and one static WEP key is exchanged for about 500 billion possible keys. It can be used to encrypt this data set. The key generation mechanism has been modified. It consists of three components: a 128-bit Basic Key (TC), a packet number (TSC) and a MAC address of the carrier. The TKIP also uses a 48-bit initialization vector. It is used to prevent repeated use of vector IV. The TKIP algorithm uses a 48-bit (TSC) packet calculation. It keeps increasing. Well, the new 16-bit TSC IV is introduced (Figure 4). Thus, a mechanism is created that can block attacks.

Authors and Affiliations

F. Shinasilova

Keywords

Related Articles

TASKS AND METHODS OF TEXT SENTIMENT ANALYSIS

The purpose of this article is to study one of the methods of social networks analysis – text sentiment analysis. Today, social media has become a big data base that social network analysis is used for various purposes...

PROTEIN IDENTIFICATION USING SEQUENCE DATABASES

The bottom-up proteomics approach (also known as the shotgun approach), based on the digestion of proteins in peptides and their sequencing using tandem mass spectrometry (MS/MS), has become widespread. The identificat...

DEVELOPMENT OF AN INFORMATION AND EDUCATIONAL PORTAL OF DISTANCE LEARNING BASED ON EDUCATIONAL DATA MINING

Currently, there is an increase in demand for distance education programs, which actualizes the problems of organizing the educational process at universities using these technologies. The article highlights and descri...

PLANNING OF THE KNOWLEDGE CONTENT OF THE EDUCATIONAL PROGRAM USING ONTOLOGICAL ENGINEERING AND DESIGNCOMPETENCE APPROACH

The article considers an innovative method of forming knowledge components of planned training, based on the concepts and mechanisms of ontological engineering, projectoriented learning technology and the graduate’s comp...

ANALYSIS OF METHODS FOR DETECTING FACES IN AN IMAGE

In this article, computer vision is considered as modern technology of automatic processing of graphic images, and the relationship between the terms “computer vision” and “machine vision” is investigated. A diagram of...

Download PDF file
  • EP ID EP711329
  • DOI 10.37943/AITU.2020.1.63687
  • Views 106
  • Downloads 0

How To Cite

F. Shinasilova (2022). METHODS OF INFORMATION SECURITY IN WIRELESS NETWORKS. Scientific Journal of Astana IT University, 1(1), -. https://europub.co.uk/articles/-A-711329