A Method of Authenticating WLAN APs for Smartphones |
Shin, DongOh
(인하대학교 컴퓨터정보공학과 정보호호연구실)
Kang, Jeonil (인하대학교 컴퓨터정보공학과 정보호호연구실) Nyang, DaeHun (인하대학교 컴퓨터정보공학과 정보호호연구실) Lee, Sokjoon (한국전자통신연구원 사이버보안연구본부) Lee, KyungHee (수원대학교 전기공학과) |
1 | Editors of IEEE 802.11, "Wireless LAN medium access control (MAC and physical layer (PHY) specification, draft," Standard IEEE 802.11, 1997. |
2 | I. Kim, J. Cho, T. Shon, and J. Moon, "A method for detecting unauthorized access point over 3G network," J. The Korea Institute of Information Security & Cryptology(JKIISC), vol. 22, no. 2, pp. 259-266, Apr. 2012. 과학기술학회마을 |
3 | S. Kang, D. Nyang, J. Choi, and S. Lee, "Relaying rogue AP detection scheme using SVM," J. The Korea Institute of Information Security & Cryptology(JKIISC), vol. 23, no. 3, pp. 431-444, Jun. 2013. 과학기술학회마을 DOI |
4 | H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, "A measurement based rogue ap detection scheme," in Proc. INFOCOM, pp. 1593-1601, Rio de Janeiro, Brasil, Apr. 2009. |
5 | H. Han, B. Sheng, C.C. Tan, Q. Li, and S. Lu, "A timing-based scheme for rogue AP detection," IEEE Trans. Parallel and Distributed Syst., vol. 22, no. 11, pp. 1912-1925, Nov. 2011. DOI ScienceOn |
6 | A. J. Nicholson, Y. Chawathe, M. Y. Chen, B. D. Noble, and D. Wetherall, "Improved access point selection," in Proc. MobiSys '06, pp. 233-245, NY, Jun. 2006. |
7 | D. Denning and P. Macdoran, "Location-based authentication: Grouding cyberspace for better security," Computer Fraud & Security, vol. 2, pp. 12-16, Feb. 1996. |
8 | H. Takamizawa and K. Kaijiri, "A web authentication system using location information from mobile telephones," in Proc. IASTED Int'l Conf. Web-based Education, pp. 31-36, Phuket, Thailand, Mar. 2009. |
9 | F. Zhang, A. Kondoro, and S. Muftic, "Location-based authentication and authorization using smart phones," in Proc. Trust, Security and Privacy in Computing and Commun. (TrustCom), pp. 1285-1292, Liverpool, UK, Jun. 2012. |
10 | Korea Internet & Security Agency, Wireless LAN security guide, Dec. 2011. |
11 | SKT, T Wi-Fi zone, Retrieved Dec., 5, 2013, from http://www.twifi.co.kr/. |
12 | KT, olleh Wi-Fi zone, Retrieved Dec., 5, 2013, from http://zone.wifi.olleh.com/. |
13 | LG U+, U+ Wi-Fi zone, Retrieved Dec. 5, 2013, from http://www.wifiworld.co.kr/main.s2. |
14 | Daum DNA Developer Network, Local API, Retrieved Dec. 5, 2013, from http://dna.daum.net/apis/local. |
15 | Naver Developer Center, Map API, Retrieved Dec. 5, 2013, from http://developer.naver.com/wiki/pages/MapAPI. |
16 | Google Developers, Google Maps API, Retrieved Dec. 5, 2013, from https://developers.google.com/maps/. |
17 | IEEE Report 802.11-03/845r1. (2003). Receiver sensitivity tables for MIMO-OFDM 802.11n, Nov. 2003. |
18 | J. M. Keenan, and A. J. Motley, "Radio coverage in buildings," J. British Telecom Technol., vol. 8, no. 1, pp. 19-24, Jan. 1990. |
19 | B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996. |
20 | E. Spafford, "Opus: Preventing weak password choices," Computer and Security, vol. 11, pp. 273-278, May 1992. DOI |
21 | Y. Maeng, K. Kang, D. Nyang, and K. Lee, "On nessage length efficiency of two security schemes using bloom filter", KIPS Trans.: Part C, vol. 19C, no, 3, pp. 173-178, Jun. 2012. DOI |
22 | S. von Watzdorf and F. Michahelles, "Accuracy of positioning data on smartphones," in Proc. 3rd Int'l Workshop on Location and the Web (LOCWEB), Article no. 2, NY, USA, Nov. 2010. |
23 | Ministry of Science, ICT and Future Planning, Plan to increase the number of public Wi-Fi zones to 12,000 by 2017, Retrieved Jul., 12, 2013, from http://www.msip.go.kr. |