A comparison of wi-fi and wimax with case studies - Florida State ...
A comparison of wi-fi and wimax with case studies - Florida State ...
A comparison of wi-fi and wimax with case studies - Florida State ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
user. The awakened MS <strong>wi</strong>ll send a PS-Poll frame to the base station to get the buffered frames.<br />
The base station can choose either immediate response or deferred response to the MS. [17][55]<br />
The immediate response means the BS (Base Station) <strong>wi</strong>ll send the buffered frames to MS<br />
after SIFS interval. If the BS chooses a deferred response, it <strong>wi</strong>ll send an ACK frame back to MS<br />
<strong>fi</strong>rst, <strong>and</strong> then transmit data frames later. After sending the PS-Poll frame, the MS must stays<br />
awake until the whole process is over. The BS noti<strong>fi</strong>es the MS for buffered frames by sending a<br />
beacon frame. The buffered frames may be fragmented for transmission. [17][55]<br />
3.3.2.7. Security<br />
This is a very important part for the whole MAC layer design. So far the most <strong>wi</strong>dely used<br />
security procedure for <strong>wi</strong>reless communication is WEP (Wired Equivalent Privacy). WEP uses<br />
RC4 cipher to encrypt data. The RC4 cipher is a kind <strong>of</strong> symmetric stream cipher; it generates a<br />
keystream <strong>and</strong> then uses the XOR algorithm to mix <strong>wi</strong>th data to produce the ciphertext stream.<br />
The receiver <strong>wi</strong>ll use the same XOR algorithm to recover original data. To encrypt the data, the<br />
secret key has to be chosen <strong>fi</strong>rst <strong>and</strong> then extended to the same size <strong>of</strong> data by PRNG<br />
(Pseudor<strong>and</strong>om Number Generator). This extended secret key is called keystream. For<br />
recovering data, both transmitters <strong>and</strong> receivers must have the same secret key <strong>and</strong> PRNG, <strong>and</strong><br />
how to distribute the secret key is an important issue; sometimes it may be preloaded by system<br />
designers or manufacturers. The other issue is “key to keystream expansion” <strong>of</strong> RC4 stream<br />
cipher, because the safety is dependent upon on how r<strong>and</strong>om it is. [17][55]<br />
The communication security has three major properties: con<strong>fi</strong>dentiality, integrity <strong>and</strong><br />
authentication. Con<strong>fi</strong>dentiality is needed to protect data from being stolen by unauthorized<br />
people. Integrity is used to make sure the data has not been changed during transmission. This<br />
part is dependent on CRC code. Finally, authentication is the foundation <strong>of</strong> all security<br />
procedures. For transmitting data, the users must be trusted <strong>and</strong> the source must be reliable.<br />
Other<strong>wi</strong>se, authorization <strong>and</strong> access control <strong>wi</strong>ll not be allowed. [17][55]<br />
RC4 shared secret key is composed by 40-bit shared secret <strong>and</strong> 24-bit IV (Initialization<br />
Vector) usually called 64-bit WEP <strong>and</strong> the other one is 128-bit WEP. When framing a frame,<br />
WEP <strong>wi</strong>ll generate an ICV (Integrity Check Value) which is a hash value to combine <strong>wi</strong>th<br />
payload as an original data. This ICV can use to protect data from unauthorized changes. After<br />
entering the original payload, secret key <strong>and</strong> IV, WEP can generate an encrypted frame for<br />
transmission in either secure or not secure network. Figure 3-20[17] shows the frame structure<br />
<strong>and</strong> operation <strong>of</strong> WEP. Figure 3-21[55] shows the encryption process. [17][55]<br />
32