METHODS OF INFORMATION SECURITY IN WIRELESS NETWORKS

Journal Title: Scientific Journal of Astana IT University - Year 2022, Vol 1, Issue 1

Abstract

The development of information technology sets the task of improving the reliability of computer networks. To study the security of networks, it is necessary to study the creation of network protocols, network architectures, and ways to strengthen security when transmitting information resources over a network. Network attacks, failures, and the failure of network devices are key factors affecting the security of information transmission in wireless networks.This article discusses methods for protecting information in wireless networks, including standards for authentication, encryption, and security. There are several security standards, but this article describes the effectiveness of those standards and the key principles used in those standards. It also outlines the principles of standards that ensure the confidentiality and integrity of data. That is, the TKIP protocol generates a new secret key for each packet of data transmitted, and one static WEP key is exchanged for about 500 billion possible keys. It can be used to encrypt this data set. The key generation mechanism has been modified. It consists of three components: a 128-bit Basic Key (TC), a packet number (TSC) and a MAC address of the carrier. The TKIP also uses a 48-bit initialization vector. It is used to prevent repeated use of vector IV. The TKIP algorithm uses a 48-bit (TSC) packet calculation. It keeps increasing. Well, the new 16-bit TSC IV is introduced (Figure 4). Thus, a mechanism is created that can block attacks.

Authors and Affiliations

F. Shinasilova

Keywords

Related Articles

NEURAL NETWORK MODELING AND OPTIMISING OF THE AGGLOMERATION PROCESS OF SULPHIDE POLYMETALLIC ORES

During the operation of the lead-zinc production while processing of polymetallic ores, problems arose related to the quality of products and the efficient use of equipment – agglomeration furnace and crushing apparatus...

DYNAMICS AND IMPACT OF DIGITAL FOOTPRINT ON PROJECT SUCCESS

The digital footprint of the project is its integral characteristic, reflecting both the “official” information on the project, unnecessary and any mention of the project including social networks and other Internet re...

APPLICATION OF INFORMATION TECHNOLOGIES FOR SEMANTIC TEXT PROCESSING

An expert system for text analysis based on the heuristic knowledge of an expert linguist is proposed. Methods of linguistic analysis of the text through the use of computer technology have been further developed. Data...

TECHNOLOGY TRANSFER OFFICE MODEL

At present creation of specialized organizational structure, the technology transfer office (TTO) in higher education institutions (HEIs) becomes increasingly important for establishing communication between scientists...

INFORMATION TECHNOLOGIES AND THE FUTURE OF EDUCATION IN THE REPUBLIC OF KAZAKHSTAN

The aim of the article is a comprehensive approach to addressing the digitalization of education in the Republic of Kazakhstan based on identifying problems in this area, forming priority tasks and possible ways to sol...

Download PDF file
  • EP ID EP711329
  • DOI 10.37943/AITU.2020.1.63687
  • Views 99
  • Downloads 0

How To Cite

F. Shinasilova (2022). METHODS OF INFORMATION SECURITY IN WIRELESS NETWORKS. Scientific Journal of Astana IT University, 1(1), -. https://europub.co.uk/articles/-A-711329