Forum

  • By (Deleted User)

    Basically it means using a different key for each packet. WPA's TKIP with MIC (message integrity check) allows this and it verifies each packet is passed intact without modification -- sort of like a CRC32 check for each wireless packet received. If there's an error, the packet is re-requested. If it happens three times in a row, all users sessions on that AP are shut down for up to 60 seconds (the defaults might be different on different APs). While this is an effective hacker prevention technique, it's not without its issues because MIC is typically much more processor intensive than just using TKIP for encryption.

Page 1 of 1
  • 1