• Title/Summary/Keyword: 무선 AP

Search Result 441, Processing Time 0.03 seconds

Effective Mobility Management of Split Point Selection Considering Candidate AP in SDN (SDN에서 후보 AP를 고려한 스플릿 포인트 선택의 효율적인 이동성 관리)

  • Kim, Bora;Yeoum, Sanggil;Choo, Hyunseung
    • Annual Conference of KIPS
    • /
    • 2018.10a
    • /
    • pp.118-121
    • /
    • 2018
  • 끊김 없는 이동성은 멀티미디어가 풍부한 실시간 서비스를 지원하는 미래의 무선 네트워크에서 필수적이다. SDN (Software Defined Networking)은 중앙 집중식 컨트롤러를 통해 무선 네트워크에서 세밀한 플로우 수준의 이동성 관리를 제공할 수 있지만 핸드오버 지연의 새로운 네트워킹 패러다임이다. 스플릿 포인트 방식은 SDN 무선 네트워크에서 핸드오버 및 종단 간 전송 지연을 줄이는 효과적인 방법이다. 스플릿 포인트는 트래픽이 새로운 AP (Access Point)를 향하여 핸드오버 한 후에 기존 플로우 경로상에 존재하는 스위치이다. 본 논문에서는 MN-CN (Corresponding Node) 경로의 각 스위치의 가중치를 스위치와 후보 AP 사이의 평균 고리(홉)로 계산하고 최소 가중치를 갖는 스위치가 스플릿 포인트로 선택된다. 스플릿 포인트 선택 외에도 이 논문은 SDN 에서 제공하는 제어 및 데이터 플레인 분리를 이용하여 핸드오버 후 플로우에 대한 최적의 경로를 복원한다. 제안 아이디어의 수치 해석은 이전 솔루션과 비교하여 총 비용이 9.6 % ~ 13 % 향상되었음을 보여준다.

Relaying Rogue AP detection scheme using SVM (SVM을 이용한 중계 로그 AP 탐지 기법)

  • Kang, Sung-Bae;Nyang, Dae-Hun;Choi, Jin-Chun;Lee, Sok-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.431-444
    • /
    • 2013
  • Widespread use of smartphones and wireless LAN accompany a threat called rogue AP. When a user connects to a rogue AP, the rogue AP can mount the man-in-the-middle attack against the user, so it can easily acquire user's private information. Many researches have been conducted on how to detect a various kinds of rogue APs, and in this paper, we are going to propose an algorithm to identify and detect a rogue AP that impersonates a regular AP by showing a regular AP's SSID and connecting to a regular AP. User is deceived easily because the rogue AP's SSID looks the same as that of a regular AP. To detect this type of rogue APs, we use a machine learning algorithm called SVM(Support Vector Machine). Our algorithm detects rogue APs with more than 90% accuracy, and also adjusts automatically detection criteria. We show the performance of our algorithm by experiments.

A Priority Based AP Channel Allocation Scheme for Emergency Data Transmission in Wi-Fi Networks (Wi-Fi 환경에서의 응급 데이터 전송을 위한 우선순위 기반 AP 채널 할당 기법)

  • Jo, In-Hee;Lee, Hyeop-Geon;Lee, Sang-Ji;Shin, Yong-Tae
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.651-654
    • /
    • 2011
  • Wi-Fi 는 스마트 네트워크 환경 구현을 위한 기반 분야로 다양한 분야 및 서비스에 활용되고 있다. Wi-Fi 는 AP (Access Point)를 통해 보다 넓은 범위의 네트워크를 가능하게 하며, 여러 무선 단말기와 통신을 한다. 또한 Wi-Fi 는 DCF(Distributed Coordinate Function) 프로토콜을 이용하여 AP 를 포함한 모든 무선 단말기에게 공평하게 채널을 할당한다. 그러나 AP 는 채널을 요청하는 하위 단말기에 대해 도착한 순서에 따라 채널을 할당하는 FIFS(First In First Service) 스케줄링을 사용하여 데이터를 처리함으로써 데이터 전송 신뢰도를 저하시키고, 전송 지연이 발생하여 응급 데이터 전송에 적합하지 않다. 이에 본 논문에서는 응급 데이터 전송을 위한 우선순위 기반 AP 채널 할당 기법을 제안한다. 제안하는 기법은 전송하려는 데이터에 우선순위를 부여하여 응급 데이터의 채널 요청 처리율을 높이고 채널 할당 지연시간을 감소시켜 응급 데이터 전송 신뢰도를 향상시킨다.

A Method of Authenticating WLAN APs for Smartphones (스마트폰을 위한 무선 AP 인증 방법)

  • Shin, DongOh;Kang, Jeonil;Nyang, DaeHun;Lee, Sokjoon;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.17-28
    • /
    • 2014
  • The increase of smartphone users have made mobile carriers offload increasingly congested traffic of 3/4G by providing Wi-Fi hot-spots in the public places such as coffee shops and subway stations. In the traditional authentication in WLAN, the users should convince the service providers that they are valid customers before they use WLAN services. Since the authentication protocol is designed for service providers. Even with the mutual authentication based on the IEEE 802.1X, which is supported by IEEE 802.11 standard, it is difficult to be convinced of that the service providers really have installed the WLAN APs, which users are confronted with. An attacker can install rogue APs that masquerade as legitimate APs by copying the SSID, MAC address, etc. in order to obtain users' private information. In this paper, we introduce a method of authenticating legitimate APs for smartphone users. And we show our proposal can be well utilized for the current Wi-Fi hot-spots as a security plug-in and prove it through our experiments.

Wireless LAN Based Indoor Positioning Using Received Signal Fingerprint and Propagation Prediction Model (수신 신호 핑거프린트와 전파 예측 모델을 이용한 무선랜 기반 실내 위치추정)

  • Kim, Hyunsu;Bae, Jimin;Choi, Jihoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.12
    • /
    • pp.1021-1029
    • /
    • 2013
  • In this paper, we propose a new indoor location estimation method which combines the fingerprint technique with the propagation prediction model. The wireless LAN (WLAN) access points (APs) deployed indoors are divided into public APs and private APs. While the fingerprint method can be easily used to public APs usually installed in fixed location, it is difficult to apply the fingerprint scheme to private APs whose location can be freely changed. In the proposed approach, the accuracy of user location estimation is improved by simultaneously utilizing public and private APs. Specifically, the fingerprint method is used to the received signals from public APs and the propagation prediction model is employed to the signals from private APs. The performance of the proposed method is compared with that of conventional indoor location estimation schemes through measurements and numerical simulations in WLAN environments.

Implementation of a Secure Wireless LAU System using AP Authentication and Dynamic Key Exchange (AP 인증 및 동적 키 분배를 이용한 안전한 무선랜 시스템 구현)

  • Lee, Jong-Hu;Lee, Myung-Sun;Ryou, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.497-508
    • /
    • 2004
  • The existing wireless LAN standard IEEE802.11b has many vulnerabilities from security point of view. The authentication mechanisms in IEEE802.11b have many vulnerabilities. As a result to complement the weak of IEEE802.11b authentication, the IEEE802.1x had been developed in the sense of providing strong user authentication with appropriate mechanism. But this mechanism does not perform AP authentication and there are also some weak points. And in confidentiality and message Integrity case, WEP is weak from key stream reuse attack, IV reuse attack and so on. For that reason, in this paper we propose secure wireless LAN system. Our system provides strong user authentication, confidentiality, and message integrity based on existing IEEE802.1x framework and TLS.

Design and Implementation of Location Based Seamless Handover for IEEE 802.11s Wireless Mesh Networks (IEEE 802.11s 무선 메쉬 네트워크를 위한 위치 기반 핸드오버의 설계 및 구현)

  • Lee, Sung-Han;Yang, Seung-Chur;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2004-2010
    • /
    • 2009
  • The characteristic of the backbond for distribution service in WMNs(Wireless Mesh Networks) is that WMNs has multiple links connected to mesh points and dynamic routing protocol such as AODV to establish routing paths. When the terminal is communicating with the service through new AP, mobile nodes can resume communication by setting only the link between new AP and mobile node in the case of existing WLANs, but WMNs needs path establishment process in multihop networks. Our goal in this paper is to support the seamless communication service by eliminating path establishment delay in WMNs. We present the method that eliminates the handover latency by predicting the location of handover using GPS information and making the paths to their destination in advance. We implement mesh nodes using embedded board that contains proposed handover method and evaluate performance of handover latency. Our experiment shows that handover delay time is decreased from 2.47 to 0.05 seconds and data loss rate is decreased from 20~35% in the existing method to 0~10% level.

Access Point Selection Algorithm for Densely Deployed IEEE 802.11 WLANs (IEEE 802.11 무선랜 환경에서의 AP 선택 알고리즘)

  • Kim, Gyul;Lee, SuKyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.707-713
    • /
    • 2016
  • In the IEEE 802.11 Wireless LAN environment, the common Access Point (AP) selection of the existing terminal is based on signal strength. However, the signal strength-based AP selection method does not ensure an optimal data rate. Recently, several AP selection methods to solve this problem have been suggested. However, when we select AP, these have a latency problem and don't consider dense environments of AP. In this paper, we confirm the problem of the conventional AP selection about the signal strength and the throughput through the actual measurement, and propose algorithm that selects AP by scoring link speed and wireless round trip time to compensate the problem. Furthermore, the proposed AP selection algorithm through the actual experiment proves the improved performance as compared with the existing methods.

Effective Channel Assignment Scheme for Performance Enhancement in HiperLAN/2 Wireless LAN (HiperLAN/2 무선랜의 성능향상을 위한 효율적인 채널 할당방안연구)

  • Jang, Soon-Gun;Jang, Jae-Hwan;Lim, Seog-Ku
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.453-456
    • /
    • 2009
  • HiperLAN Type2에서의 MAC 프로토콜은 TDMA/TDD을 기반으로 하며, 무선채널은 중앙제어방식으로 운영되는 AP(Access Point)에 의해서 할당된다. 상향링크로 데이터 전송이 필요한 이동단말은 RCH 채널을 통하여 AP에게 무선자원을 요청한다. 각 MAC 프레임마다 RCH 수를 동적으로 변경하는 것이 중요한데, RCH 수가 많이 할당되면 무선자원의 낭비를 초래하며, RCH 수가 적게 할당되면 이동단말간의 충돌이 증가하고 AP에 접속하는 시간도 길어진다. 따라서 RCH 수는 트래픽에 따라 적절하게 할당되어야 한다. 본 논문에서는 HiperLAN/2에서의 성능향상을 위해 충돌과 성공을 고려하여 RCH(Random CHannel)수를 고정적인 ${\beta}$값만큼 증감하는 방법을 제안하였다. 제안한 방법의 효율성을 입증하기 위해 시뮬레이션을 수행하였으며, 처리율과 접속지연 관점에서 분석하였다.

  • PDF

The study for improvement of traffic performance based on load balancing in wireless LAN (로드발랜싱기반 무선랜의 트래픽 성능 향상에 관한 연구)

  • Park, Chi-Ho;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.2 s.344
    • /
    • pp.1-6
    • /
    • 2006
  • This paper proposes association algorithm using load balancing for efficient AP selection under environment of wireless local area network(WLAN). Our scheme measures arrival time of association information when establishing the connection between access points and access terminal, analyzes the load condition of AP, and applies load balancing. AT selects and sets up low traffic AP by measuring traffic of connected access terminal, which can prevent over-franc of access points under hotspot environment that users access simultaneously. According to the above-described selection in a high speed wireless Internet service based on public WLAN technologies that are currently in operations. Further, it is possible to improve the efficiency of network management.