Study of applicable security tunneling technique for military wireless network

군 무선네트워크 환경에서 적용 가능한 보안 터널링 기법 연구

  • Received : 2015.06.08
  • Accepted : 2015.06.28
  • Published : 2015.06.30

Abstract

Due to the rapid development of wireless communication technology, foundation system of military communication that is based on the daily use technology has been changed in to wireless system. However, military communication contains clssified information, and it is expected to have increase amount of enemy's there in such a imperfect security system. The next generation of tactical network communication system is expected to adopt All IP based wireless system. This research studies expected threatening factor on the wireless environment, and find the appropriate tunneling techniques.

무선통신기술의 급격한 발달로 인해 상용기술을 접목한 군의 통신 기반체계 또한 무선체계 위주로 변하고 있다. 하지만 군의 통신은 비밀스러운 내용이 많을뿐더러 특히 물리적으로 보안시스템이 불완전한 무선 환경에서는 적의 위협이 더욱더 증가될 것으로 예상된다. 최근 차세대 전술네트워크 통신 시스템이 All IP 기반의 무선체계로 전력화될 예정이다. 본 논문에서는 이러한 무선 환경에서 예상되는 위협요소를 살펴보고 이에 대한 적절한 터널링 기법에 대해 연구해 본다.

Keywords

References

  1. Tactical Information Communications Network Operation FM reference 1-2, Army HQ, p. 2-26-27, 2015.
  2. Ajou Univ TNRC, "Wireless Network Security Structure & Invation Search/Reaction Technology Research", JCS, pp. 63-78, 2009.
  3. Steven Brown, "Implementing Virtual Private Networks", McGraw-Hill, pp. 97-140, 1999.
  4. H. K. Joo, "Analysis of the IPsec Internet Key Exchange (IKE) Protocol", Korean Institute of Information Security & Cryptology, vol 10, no 4, pp. 33-46, 2000.
  5. S. H. Hong, "Issues and Security on IPSec : Survey", Journal of Digital Convergence, vol 12, no 8, pp. 243-248, 2014. https://doi.org/10.14400/JDC.2014.12.8.243
  6. S. W. Lee, H. S. Kim and K. Y. Yoo, "A Password-based Efficient Key Exchange Protocol "The Korean Institute of Information Scientists and Engineers, vol 31, no 4, pp. 347-353, 2004.
  7. M. Bellare and P. Rogaway, "The Authentication protocol for password-based authentication key exchange", Presented to IEEE P1363a, pp. 125-132, 2000