Prerequisite – Wireless Communication | Set 2
Earlier, we talked about various Authentication methods. Now we talked about another aspect of wireless security, The Integrity. Integrity means the correctness of messages sent over the wireless network or the internet. Original 802.11 standard defined for the wireless network has only the WEP method for securing data send over the network.
Types of Integrity Method :
There are three integrity method : Temporal Key Integrity Protocol (TKIP), Counter CBC-MAC Protocol (CCMP), and Galois Counter Mode Protocol (GCMP). These are explained as following below.
1. Temporal Key Integrity Protocol (TKIP) –
WEP used for authentication in the security of wireless communication was later known to be vulnerable. TKIP was proposed after WEP being found vulnerable. It is designed by WiFi Alliance in 2002 and having a key-size of 128 bits. It uses the RC4 cipher algorithm for encrypting each frame.
It adds the following security features beneath underlying WEP encryption.
- Time Stamp
- TKIP Sequence Counter
- Sender’s MAC Address
- Message Integrity Check (MIC)
- Key mixing algo
TKIP was used as an Integrity method for some time until some attackers were found against it. Actually, after the revision of 802.11 standards in 2012, named 802.11-2012, TKIP is not recommended anymore.
2. Counter CBC-MAC Protocol (CCMP) –
A more secure Integrity method than TKIP was developed called Counter CBC-MAC Protocol.
It consists of two Algorithms –
- AES counter mode encryption.
- Cipher Block Chaining Message Authentication Code (CBC-MAC) for message integrity check.
Advanced Encryption Standard (AES) is the strongest encryption algorithm till date. It is widely used by security experts all over the world because it is open and publically accessible. The only catch in implementation of CCMP is that both clients and AP must have supporting hardware. CCMP is used in the WPA2 standard used in WiFi security.
3. Galois Counter Mode Protocol (GCMP) –
Galois Counter Mode Protocol abbreviated as GCMP is most secure authentication encryption method which is more secure and efficient than CCMP.
GCMP consists of two algorithm –
- AES counter mode encryption like CCMP.
- Galois Message Authentication Code, to check the message integrity.
GCMP is used in the WPA3 standard used in WiFi security.
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- Wireless Communication | Set 2
- Wireless Communication | Set 1
- Traditional wireless mobile communication
- Advantages and disadvantages of Wireless Communication
- Difference between Satellite Communication and Optical Communication
- Differences between Wireless Adhoc Network and Wireless Sensor Network
- What is Wi-Fi(Wireless Fidelity)?
- Wireless Security | Set 1
- Wireless Application Protocol
- Wireless Local Loop
- Modes of Wireless Connectivity
- Wireless Sensor Network (WSN)
- Securing wireless and mobile devices
- Wireless Body Area Network
- Collision Avoidance in wireless networks
- Wireless/Mobile Computing Technologies
- Network and Communication
- Near Field Communication (NFC)
- Wormhole Attack in Wireless Sensor Networks
- Sinkhole Attack in Wireless Sensor Networks
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.