18.02.2014 Views

wireless ad hoc networking

wireless ad hoc networking

wireless ad hoc networking

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

432 Wireless Ad Hoc Networking<br />

TKIP countermeasures for the authenticator: When the authenticator<br />

receives a frame with a Michael MIC error, it discards the affected<br />

frame, increases the Michael MIC failure counter by one, generates<br />

the MLME-MICHAELMIC FAILURE.indication primitive, starts<br />

the timer, and checks if the Michael MIC failure is reported again.<br />

If it is reported again within 60 s, the AP deauthenticates, deletes<br />

all PTK for all stations using TKIP, and discards the GTK, and after<br />

60 s, new PTK and GTK are constructed. TKIP countermeasures for<br />

the authenticator are shown in Figure 16.12.<br />

Wait for michael<br />

MIC failure<br />

Send a michael MIC<br />

failure report<br />

Timer

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!