Got it

Integrity in Wireless Communication

Latest reply: Dec 27, 2021 20:04:00 1131 85 52 0 0

Hello, everyone!


Today, I would like to share with you an article on the Integrity in wireless communications.


Prerequisite * BSS in Wireless Communication


The correctness of communications delivered via a wireless network or the internet is referred to as integrity. The original 802.11 wireless network standard only offers the WEP mechanism for safeguarding data sent over the network.


Types of Integrity Method :


There are three methods for ensuring integrity:


  • Temporal Key Integrity Protocol (TKIP) 

  • Counter CBC-MAC Protocol (CCMP) 

  • Galois Counter Mode Protocol (GCMP) 


The following are the explanations.


1. Temporal Key Integrity Protocol (TKIP) 


WEP, which was utilized for authentication in wireless communication security, was subsequently discovered to be susceptible. Following the discovery of WEP's vulnerability, TKIP was proposed. It was created in 2002 by the WiFi Alliance and has a key size of 128 bits. Each frame is encrypted using the RC4 cipher technique.


Underneath the fundamental WEP encryption, it adds the following security enhancements.


  1. Time Stamp

  2. TKIP Sequence Counter

  3. Sender’s MAC Address

  4. Message Integrity Check (MIC)

  5. Key mixing algo


For a long period, TKIP was utilized as an Integrity technique until some attackers were discovered who could exploit it. Actually, TKIP is no longer recommended after the change of 802.11 specifications in 2012, known as 802.11-2012.


2. Counter CBC-MAC Protocol (CCMP) 


The Counter CBC-MAC Protocol was created as a more secure Integrity mechanism than TKIP.


It is made up of two algorithms:


  1. AES counter mode encryption

  2. Cipher Block Chaining Message Authentication Code (CBC-MAC) to ensure the integrity of the message


The Advanced Encryption Standard (AES) is currently the most powerful encryption algorithm available. Because it is open and publicly available, it is widely used by security specialists all around the world. The only snag with CCMP is that it requires both clients and access points to have supported hardware. WPA2 is a WiFi security protocol that uses CCMP.


3. Galois Counter Mode Protocol (GCMP) 


The Galois Counter Mode Protocol, abbreviated as GCMP, is a more secure and efficient authenticating encryption mechanism than CCMP.


GCMP is made up of two algorithms:


  1. AES counter mode encryption like CCMP.

  2. Galois Message Authentication Code, to ensure the integrity of the message


WPA3 is a WiFi security standard that uses GCMP.


You are welcome to like and exchange in the comment area. Stay safe and Thank you!

t_0002.gif

cool
View more
  • x
  • convention:

SaraZahid
SaraZahid Created Nov 22, 2021 17:44:12 (1) (0)
 
Zemo_Mccracken
Zemo_Mccracken Created Nov 26, 2021 19:06:53 (0) (0)
Thank you!  
Zemo_Mccracken
Zemo_Mccracken Reply SaraZahid  Created Nov 26, 2021 19:07:02 (0) (0)
 
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Nov 26, 2021 19:07:08 (0) (0)
Thank you!  
EL.BODO
EL.BODO Created Dec 1, 2021 18:27:37 (0) (0)
✌  
amr_rashedy
MVE Author Created Nov 22, 2021 17:37:11

thanks for sharing
View more
  • x
  • convention:

shakeela
shakeela Created Nov 22, 2021 17:46:53 (1) (0)
 
Zemo_Mccracken
Zemo_Mccracken Created Nov 26, 2021 19:07:15 (0) (0)
Thank you!  
Zemo_Mccracken
Zemo_Mccracken Reply shakeela  Created Nov 26, 2021 19:07:23 (0) (0)
 
thanks for sharing
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Nov 26, 2021 19:07:35 (0) (0)
Thank you!  
Thanks for sharing
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Nov 26, 2021 19:07:41 (0) (0)
Thank you!  
Integrity in Wireless Communication-4358345-1
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Nov 26, 2021 19:07:51 (0) (0)
Thank you!  
EL.BODO
EL.BODO Created Nov 29, 2021 18:35:32 (0) (0)
 
Thanks for sharing
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Nov 26, 2021 19:07:58 (0) (0)
Thank you!  
andersoncf1
MVE Author Created Nov 22, 2021 18:16:34

Thanks for sharing
View more
  • x
  • convention:

user_4326135
user_4326135 Created Nov 24, 2021 05:35:38 (0) (0)
 
Zemo_Mccracken
Zemo_Mccracken Created Nov 26, 2021 19:08:07 (0) (0)
Thank you!  
Thank you for sharing .go ahead
View more
  • x
  • convention:

Zemo_Mccracken
Zemo_Mccracken Created Nov 26, 2021 19:08:15 (0) (0)
Thank you!  

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.