• Title/Summary/Keyword: 무선 AP

Search Result 441, Processing Time 0.028 seconds

A Study on Efficient Access Point Installation Based on Fixed Radio Wave Radius for WSN Configuration at Subway Station (지하철 역사 내 WSN 환경구축을 위한 고정 전파범위 기반의 효율적인 AP설치에 관한 연구)

  • An, Taeki;Ahn, Chihyung;Lee, Youngseok;Nam, Myungwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.740-748
    • /
    • 2016
  • IT and communication technologies has contributed significantly to the convenience of passengers and the financial management of stations in accordance with the task automation in the field of the urban railway system. The foundation of the above development is based on the large amounts of data from various sensors installed in railways, trains, and stations. In particular, the sensor network that is installed in the station and train has played an important role in the railway information system. The performance of AP is affected by the number of APs and their locations installed in the station. In the installation of APs in stations, the intensity of the radio wave of the AP on its underlying position is considered to determine the number and position of APs. This paper proposes a method to estimate the number of APs and their position based on the structure of the underlying station and implemented a simulator to simulate the performance of the proposed method. The implemented simulator was applied to the decision of AP installation at Busan Seomyeon station to evaluate its performance.

VoWLAN 보안 및 로밍 설계

  • 김미연;김계진;이동훈
    • Review of KIISC
    • /
    • v.15 no.5
    • /
    • pp.83-89
    • /
    • 2005
  • 네트워크 컨버전스 및 사용자 이동성의 중시로 무선랜 기반에서 음성 서비스를 이용하고자 하는 VoWLAN 서비스에 대한 관심이 고조되고 있다. 그러나 무선랜 보안 표준기술을 그대로 적용하고자 할 때는 AP 간을 이동할 때와 서브넷 간을 이동할 때 로밍에 대한 문제가 발생한다. 이에 본 논문에서는 VoWLAN 서비스를 구현할 때 로밍과 보안 기능을 동시에 제공하기 위한 설계방법을 제안한다.

Wireless Fingerprinting Technology and Its Applications (무선 핑거프린팅 기술 및 보안응용)

  • Chung, B.H.;Kim, S.H.;Kim, J.N.
    • Electronics and Telecommunications Trends
    • /
    • v.29 no.4
    • /
    • pp.110-122
    • /
    • 2014
  • 무선환경은 가짜 클론 디바이스가 진짜인 것처럼 위장한 해킹공격에 매우 취약한 것으로 잘 알려져 있다. 그것은 단말기와 기지국(AP: Access Point)이 위변조가 쉬운 디바이스 식별자(예로 MAC(Medium Access Control) 주소, SSID, BSSID(Basic Service Set Identification) 등)를 이용하여 상호 인증하기 때문이다. 무선핑거프린팅(Wireless Fingerprinting)은 통신과정에서 발생되는 무선신호 특성으로부터 디바이스를 고유하게 식별하는 핑거프린트를 추출하여 송신 디바이스가 가짜 클론 디바이스인지 아닌지 여부를 식별하는 기술이다. 본 기술은 무선물리계층 보안을 위한 인증 및 키 생성, 무선 침입탐지, 공격자의 위치/방향/거리 추적, 무선 포랜식 및 보안관제의 성능을 결정하는 핵심기술로 활용되고 있다. 향후 등장이 예상되는 M2M 무선랜, 무선인지네트워크, 무선센서, 무선차량통신, IoT 무선통신환경에서도 본 기술의 중요성은 더욱 증가하리라 본다. 본고에서는 무선 디바이스의 핑거프린팅 개념을 이해하고, 기술 분류에 따른 세부기법 연구 및 보안응용 동향을 분석함으로써 본 기술의 발전방향을 조망해보고자 한다.

  • PDF

A Study on Security Threats and Countermeasure for WLAN Environment (무선랜 이용 환경별 보안위협 및 대응방안)

  • Park, Soon-Tai;Won, Yong-Geun;Baek, Jong-Hyun
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1350-1353
    • /
    • 2010
  • 최근, 스마트폰 등 무선랜 이용가능 단말기의 출시와 저렴한 무선 AP(Access Point) 보급 확대로 무선랜 이용이 급속히 확대되고 있다. 그동안 국내 무선인터넷 환경은 이동통신사가 구축한 고비용 폐쇄적 3G 네트워크의 데이터 통신 위주로 이루어졌으며, 무선랜 이용은 일부 기업환경 및 호텔/식당 등의 고객용 무선랜, 개인용 무선랜 등으로 한정되어 사용되었다. 하지만 '10년 스마트폰의 폭발적인 확산으로 무선랜을 통해 빠르고 저렴하게 무선 인터넷을 사용할 수 있게 됨에 따라 가정, 공공시설 등에서 무선랜 구축/활용이 매우 증가하고 있다. 논문은 무선랜에 대한 물리적, 기술적, 관리적 보안위협을 살펴보고 구축, 관리, 이용 주체별 대응방안을 제시한다.

Information Delivery Scheme by Using DTN in Battlefield Eenvironment (전장 환경에서 DTN을 이용한 정보전달기법)

  • Kim, Young-An
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.260-267
    • /
    • 2011
  • Wireless Local Area Network (WLAN) is recently become popular on the internet since we can download and transfer mass data through it. However, transferring data with distances over 100m often causes some troubles. When downloading mass data from moving vehicles such as cars, jeeps, tanks, etc., if the download process from the first AP (Access Point) is not completed then we have to re-start this process from the second AP (from 0%). Therefore, the question is how to maintain the data we have received from the first AP, and then continuously download remaining data from the next APs in a battlefield environment. In this paper, we propose an effective method for receiving mass data separately from the mobile receive nodes in a Delay Tolerant Network (DTN). We carried on an experiment and evaluation by simulation; these simulation results are provided to show the proposed information delivery scheme performance.

To increase positioning accuracy in an IPS environment WPS Search Algorithm Design (IPS 환경에서 위치 정확도를 높이기 위한 WPS 탐색 알고리즘 설계)

  • Lee, Hyoun-Sup;Shim, Man-Taek;Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.75-76
    • /
    • 2022
  • WPS is a system that finds the location of a current moving object through information of a wireless AP. The current location is determined by utilizing the outdoor and indoor AP signal strength characteristics. Even if the map is configured for the first service, the map information of the DB built by the variability of the AP signal cannot be 100% reliable in the case of outdoor. Therefore, various algorithms are needed to increase the accuracy of WPS. This paper proposes a system to increase positioning accuracy by applying various methods to determine the current position of a moving object.

  • PDF

An Effective Location-based Packet Scheduling Scheme for Adaptive Tactical Wireless Mesh Network (무선 메쉬 네트워크의 군 환경 적용을 위한 효율적인 위치기반 패킷 스케줄링 방식)

  • Kim, Young-An;Hong, Choong-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.719-727
    • /
    • 2007
  • The Wireless Mesh Network technology is able to provide an infrastructure for isolated islands, in which it is difficult to install cables or wide area such as battlefield of armed forces. Therefore, Wireless Mesh Network is frequently used to satisfy needs for internet connection and active studies and research on them are in progress However, as a result of increase in number of hops under hop-by-hop communication environment has caused a significant decrease in throughput and an increase in delay. Considering the heavy traffic of real-time data, such as voice or moving pictures to adaptive WMN, in a military environment, it is restricted for remote units to have their Mesh Node to get real-time services. Such phenomenon might cause an issue in fairness. In order to resolve this issue, the Location-based Packet Scheduling Scheme, which can provide an fair QoS to each mesh node that is connected to each echelon's AP and operates based on WRR method that gives a priority to emergency message and control packet. The performance of this scheme is validated.

DoS-Resistance Authentication Protocol for Wreless LAN (DoS 공격에 강한 무선 랜 인증 프로토콜)

  • 김민현;이재욱;최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.3-10
    • /
    • 2004
  • A Wireless Lan has an importance of access control, because we can use wireless Internet via AP(Access Point). Moreover, to use wireless LAN, we will go through authentication process of EAP. DoS(Denial of Service) attack is one of the fatal attack about these AP access and authentication process. That is, if malicious attacker keeps away access of AP or consumes memory of server and calculation ability of CPU and etc. compulsorily in authentication process, legal user can't get any services. In this paper, we presents the way of protection against the each attack that is classified into access control, allocation of resource, attack on authentication protocol. The first thing, attack to access control, is improved by pre-verification and the parameter of security level. The second, attack of allocation of resource, is done by partial stateless protocol. And the weak of protocol is done by time-stamp and parameter of access limitation.

Materialize of the IEEE802.11 MAC for Wireless Local Area Network (Wireless Local Area Network 의 IEEE802.11 MAC 의 구현)

  • 홍두의;김언곤
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.177-181
    • /
    • 2004
  • It is as research about embodiment of MAC algorithm that is point of wireless LAN technology that is radio skill that is receiving present head of a family footlights, and embodied MAC that is algorithm that control modem Rf and host interface to level that existent common use radio AP and send-receive of high speed are available that embody function that is presented to IEEE 802.11 specs using H/W and S/W. When embody actually, tested module that embody actually using module modem and RF part because test is impossible after have common use product. Also, module that embody actually designed, and is expected to be utilized in radio LAN system construction of high speed late considering CRC and FCS ewer on channel.

  • PDF

Intrusion detection agents on the wireless network design (무선네트워크 상에서의 침입탐지 에이전트 설계)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.59-70
    • /
    • 2013
  • Along with the rapid development of the wireless network (Wireless Network) technology for secure wireless communications, security problems have emerged as an important issue. In order to operate the wireless network intrusion detection system detects the agent installed on each wireless node should be. Ad-hoc network structures scattered in the AP over a wireless network without the node is a structure that makes it possible to communicate to connect. Intrusion detection agent to be installed on the node, and the corresponding energy consumption occurs when the survival time is reduced. On a node that can monitor a lot of traffic in order to increase the effect of intrusion detection, an intrusion detection agent should be placed. Therefore, in this paper, by taking advantage of the structure of Ad-hoc wireless network, considering the maximum living time of the network, while at the same time, the effectiveness of intrusion detection and intrusion detection by proposing a plan for installing the agent. Also improve the system performance by reducing the network load on each network, a system designed for data aggregation to reduce data redundancy, network energy consumption by reducing.