18.07.2013 Views

A comparison of wi-fi and wimax with case studies - Florida State ...

A comparison of wi-fi and wimax with case studies - Florida State ...

A comparison of wi-fi and wimax with case studies - Florida State ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

user. The awakened MS <strong>wi</strong>ll send a PS-Poll frame to the base station to get the buffered frames.<br />

The base station can choose either immediate response or deferred response to the MS. [17][55]<br />

The immediate response means the BS (Base Station) <strong>wi</strong>ll send the buffered frames to MS<br />

after SIFS interval. If the BS chooses a deferred response, it <strong>wi</strong>ll send an ACK frame back to MS<br />

<strong>fi</strong>rst, <strong>and</strong> then transmit data frames later. After sending the PS-Poll frame, the MS must stays<br />

awake until the whole process is over. The BS noti<strong>fi</strong>es the MS for buffered frames by sending a<br />

beacon frame. The buffered frames may be fragmented for transmission. [17][55]<br />

3.3.2.7. Security<br />

This is a very important part for the whole MAC layer design. So far the most <strong>wi</strong>dely used<br />

security procedure for <strong>wi</strong>reless communication is WEP (Wired Equivalent Privacy). WEP uses<br />

RC4 cipher to encrypt data. The RC4 cipher is a kind <strong>of</strong> symmetric stream cipher; it generates a<br />

keystream <strong>and</strong> then uses the XOR algorithm to mix <strong>wi</strong>th data to produce the ciphertext stream.<br />

The receiver <strong>wi</strong>ll use the same XOR algorithm to recover original data. To encrypt the data, the<br />

secret key has to be chosen <strong>fi</strong>rst <strong>and</strong> then extended to the same size <strong>of</strong> data by PRNG<br />

(Pseudor<strong>and</strong>om Number Generator). This extended secret key is called keystream. For<br />

recovering data, both transmitters <strong>and</strong> receivers must have the same secret key <strong>and</strong> PRNG, <strong>and</strong><br />

how to distribute the secret key is an important issue; sometimes it may be preloaded by system<br />

designers or manufacturers. The other issue is “key to keystream expansion” <strong>of</strong> RC4 stream<br />

cipher, because the safety is dependent upon on how r<strong>and</strong>om it is. [17][55]<br />

The communication security has three major properties: con<strong>fi</strong>dentiality, integrity <strong>and</strong><br />

authentication. Con<strong>fi</strong>dentiality is needed to protect data from being stolen by unauthorized<br />

people. Integrity is used to make sure the data has not been changed during transmission. This<br />

part is dependent on CRC code. Finally, authentication is the foundation <strong>of</strong> all security<br />

procedures. For transmitting data, the users must be trusted <strong>and</strong> the source must be reliable.<br />

Other<strong>wi</strong>se, authorization <strong>and</strong> access control <strong>wi</strong>ll not be allowed. [17][55]<br />

RC4 shared secret key is composed by 40-bit shared secret <strong>and</strong> 24-bit IV (Initialization<br />

Vector) usually called 64-bit WEP <strong>and</strong> the other one is 128-bit WEP. When framing a frame,<br />

WEP <strong>wi</strong>ll generate an ICV (Integrity Check Value) which is a hash value to combine <strong>wi</strong>th<br />

payload as an original data. This ICV can use to protect data from unauthorized changes. After<br />

entering the original payload, secret key <strong>and</strong> IV, WEP can generate an encrypted frame for<br />

transmission in either secure or not secure network. Figure 3-20[17] shows the frame structure<br />

<strong>and</strong> operation <strong>of</strong> WEP. Figure 3-21[55] shows the encryption process. [17][55]<br />

32

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!