Browse > Article

Study of applicable security tunneling technique for military wireless network  

Kim, Yun-young (대전대학교 / 군사학과)
Namkung, Seung-Pil (우석대학교 / 군사학과)
Publication Information
Abstract
Due to the rapid development of wireless communication technology, foundation system of military communication that is based on the daily use technology has been changed in to wireless system. However, military communication contains clssified information, and it is expected to have increase amount of enemy's there in such a imperfect security system. The next generation of tactical network communication system is expected to adopt All IP based wireless system. This research studies expected threatening factor on the wireless environment, and find the appropriate tunneling techniques.
Keywords
Wireless network; Military communication; Tunneling; Tactical Information Communications Network;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Tactical Information Communications Network Operation FM reference 1-2, Army HQ, p. 2-26-27, 2015.
2 Ajou Univ TNRC, "Wireless Network Security Structure & Invation Search/Reaction Technology Research", JCS, pp. 63-78, 2009.
3 Steven Brown, "Implementing Virtual Private Networks", McGraw-Hill, pp. 97-140, 1999.
4 H. K. Joo, "Analysis of the IPsec Internet Key Exchange (IKE) Protocol", Korean Institute of Information Security & Cryptology, vol 10, no 4, pp. 33-46, 2000.
5 S. H. Hong, "Issues and Security on IPSec : Survey", Journal of Digital Convergence, vol 12, no 8, pp. 243-248, 2014.   DOI
6 S. W. Lee, H. S. Kim and K. Y. Yoo, "A Password-based Efficient Key Exchange Protocol "The Korean Institute of Information Scientists and Engineers, vol 31, no 4, pp. 347-353, 2004.
7 M. Bellare and P. Rogaway, "The Authentication protocol for password-based authentication key exchange", Presented to IEEE P1363a, pp. 125-132, 2000