![](/images/new-backgrounds/1179666/17966615x1.webp)
TKIP – Temporal Key Integrity Protocol is an advanced encryption method using the RC4 algorithm. Instead of using the sequential IV, a random IV will be used, and the IV key definition will be updated regularly at a preset time interval.
MIC – Message Integrity Check is an encryption method used to prevent a hacker from changing the data content. An encryption algorithm and bit checksum at both the sender and receiver ends are used to check for alteration of the packet content.
5.1.3 Access Authorization
When the client is approved and authenti- cated for a communication session, the client receives a unique WEP key from the security server, such as a RADIUS server, under the 802.1x/EAP authorization specification. A new WEP key is issued for each connection, thus improving security, and the WEP key is updated regularly at a preset time interval. Another method to screen out unauthorized users is MAC address filtering.
MAC Address – Media Access Control address is a hardware address that uniquely identifies network hardware such as a wireless NIC or an AP. It is easy to access a network with a stolen wireless NIC. Although it is used as the top level filtering, it is not secure enough, because MAC addresses can be duplicated by non- registered users.
5.1.4 IBSS Security
IBSS – Independent Basic Service Set security is used for ad hoc communications like the
5.2Integrity Features
5.2.1 Improved Fault Tolerance
A company’s Intranet is an important corporate communication backbone, so the
5.2.2 Link Integrity
When multiple access points use the same frequency for roaming, they tend to interfere with each other. The
3