METHODS OF INFORMATION SECURITY IN WIRELESS NETWORKS
Journal Title: Scientific Journal of Astana IT University - Year 2022, Vol 1, Issue 1
Abstract
The development of information technology sets the task of improving the reliability of computer networks. To study the security of networks, it is necessary to study the creation of network protocols, network architectures, and ways to strengthen security when transmitting information resources over a network. Network attacks, failures, and the failure of network devices are key factors affecting the security of information transmission in wireless networks.This article discusses methods for protecting information in wireless networks, including standards for authentication, encryption, and security. There are several security standards, but this article describes the effectiveness of those standards and the key principles used in those standards. It also outlines the principles of standards that ensure the confidentiality and integrity of data. That is, the TKIP protocol generates a new secret key for each packet of data transmitted, and one static WEP key is exchanged for about 500 billion possible keys. It can be used to encrypt this data set. The key generation mechanism has been modified. It consists of three components: a 128-bit Basic Key (TC), a packet number (TSC) and a MAC address of the carrier. The TKIP also uses a 48-bit initialization vector. It is used to prevent repeated use of vector IV. The TKIP algorithm uses a 48-bit (TSC) packet calculation. It keeps increasing. Well, the new 16-bit TSC IV is introduced (Figure 4). Thus, a mechanism is created that can block attacks.
Authors and Affiliations
F. Shinasilova
DETERMINATION OF THE OPTIMAL CONTROLLABLE KEY INDICATOR OF CALL CENTER IN ORDER TO INCREASE EFFICIENCY FOR GENERATING INCOME
This paper focuses on call centers, which have become a common means of communication with potential customers in various companies. Specifically, this paper analyzes call center data and the importance of assessing key...
FEASIBILITY ANALYSIS OF AIR FLOATING DESIGN FOR ELECTRICITY GENERATION
In the past several decades, there were presented different innovative technologies rather than traditional wind turbines for renewable energy that uses wind kinetic energy and remains in the air through aerodynamic fo...
A MATHEMATICAL MODEL FOR AN AUTOMATED SYSTEM OF MEDICAL DIAGNOSTICS
One of the primary focuses of the Republic of Kazakhstan concerning sustainable and stable improvements in the well-being of its population is the advancement of the healthcare sector. A mathematical model for an automat...
SUBJECT BEHAVIOR DETECTION AND ANALYSIS BASED ON COMPUTER VISION TECHNOLOGY
This article discusses the current problem of identifying violations during distance learning during the final certification. The coronavirus (COVID-19) pandemic has served as a stimulus for innovation in the field of...
ANALYSIS OF METHODS FOR DETECTING FACES IN AN IMAGE
In this article, computer vision is considered as modern technology of automatic processing of graphic images, and the relationship between the terms “computer vision” and “machine vision” is investigated. A diagram of...