• Title/Summary/Keyword: 802.1x

Search Result 95, Processing Time 0.024 seconds

A Mechanistic Study on Reactions of Aryl Benzoates with Ethoxide, Aryloxides and Acetophenone oximates in Absolute Ethanol

  • 엄익환;오수진;권동숙
    • Bulletin of the Korean Chemical Society
    • /
    • v.17 no.9
    • /
    • pp.802-807
    • /
    • 1996
  • Second-order rate constants have been measured spectrophotometrically for the reactions of aryl benzoates (X-C6H4CO2C6H4-Y) with EtO-, Z-C6H4O- and Z-C6H4C(Me)=NO- in absolute ethanol at 25.0 ℃. All the reactions have been performed in the presence of excess 18-crown-6 ether in order to eliminate the catalytic effect shown by alkali metal ion. A good Hammett correlation has been obtained with a large ρ- value (-1.96) when σ- (Z) constant was used for the reaction of p-nitrophenyl benzoate (PNPB) with Z-C6H4O-. Surprisingly, the one for the reaction of PNPB with Z-C6H4C(Me)=NO- gives a small but definitely positive ρ- value (+0.09). However, for reactions of C6H5CO2C6H4-Y with EtO-, correlation of log k with σ- (Y) constant gives very poor Hammett correlation. A significantly improved linearity has been obtained when σ0 (Y) constant was used, indicating that the leaving group departure is little advanced at the TS of the RDS. For reactions of X-C6H4CO2C6H4-4-NO2 with EtO-, C6H5O- and C6H5C(Me)=NO-, correlations of log k with σ (X) constants for all the three nucleophile systems give good linearity with large positive ρ values, e.g. 2.95, 2.81 and 3.06 for EtO-, C6H5O- and C6H5C(Me)=NO-, respectively. The large ρ values clearly suggest that the present reaction proceeds via a stepwise mechanism in which the formation of the addition intermediate is the RDS.

Network 기반(基盤)의 보안정책(保安政策) 관리(管理)모델 체계(體系)에 관한 연구(硏究) : 신속성(迅速性), 보안강화(保安强化) 측면(測面)의 관리(管理)모델

  • Hwang, Ki-Young;Joo, Sung-Won
    • Review of KIISC
    • /
    • v.18 no.3
    • /
    • pp.109-117
    • /
    • 2008
  • 기업의 Network 보안은 회사의 관문 방화벽에만 의존하고 있어 보안정책의 집중으로 효율성이 저하되고 이를 우회할 경우 심각한 위험에 노출될 수 있다. 본 연구는 신속성, 보안강화 측면에서 Network보안 관리 모델을 제시하여 기업의 보안 수준을 강화하는 것을 목적으로 하고 있다. 따라서 기업 비즈니스 환경 변화를 배경으로 관련 연구 결과 및 Trend에서 제시하는 이론(802.1x 사용자 인증, Virtual Backbone 등)을 조사하고 이를 바탕으로 보안 강화 측면에서의 기업의 Network 구조와 보안정책 관리모델을 제시하여 이를 실제 기업 Network에 적용하여 얻어진 효과를 검증한다.

A Security Mechanism in support of Proactive Handoff in Wireless LAN Environment (무선랜 환경에서 Proactive Handoff를 위한 보안 방법론)

  • 오남호;정병호;조기환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.631-633
    • /
    • 2001
  • 휴대용 컴퓨터가 널리 보급됨에 따라 장소에 상관없이 네트워크 망에 연결시킬 수 있는 수단으로 무선 랜의 필요성이 증대되고 있다. 이에 따른 정보보호 문제 또한 중요한 현안으로 대두되고 있다. 현재 IEEE 802.1X를 중심으로 무선랜에서의 향상된 정보보호 솔루션을 제공하기 위한 노력이 진행 중에 있다. 하지만, 무선 랜 환경에서 안전하고 빠른 handoff를 지원해 주기 위한 방안은 부족한 상황이다. 이러한 필요성에 따라 본 논문에서는 무선 LAN환경에서 빠른 handoff를 제공하는 Proactive handoff를 지원하기 위한 안전만 보안 방법론을 제안한다. 이 때 키 교환 메커니즘으로 EAP-TLS를 이용한 방법을 토대로 한다.

  • PDF

Initial Timing Acquisition for Binary Phase-Shift Keying Direct Sequence Ultra-wideband Transmission

  • Kang, Kyu-Min;Choi, Sang-Sung
    • ETRI Journal
    • /
    • v.30 no.4
    • /
    • pp.495-505
    • /
    • 2008
  • This paper presents a parallel processing searcher structure for the initial synchronization of a direct sequence ultra-wideband (DS-UWB) system, which is suitable for the digital implementation of baseband functionalities with a 1.32 Gsample/s chip rate analog-to-digital converter. An initial timing acquisition algorithm and a data demodulation method are also studied. The proposed searcher effectively acquires initial symbol and frame timing during the preamble transmission period. A hardware efficient receiver structure using 24 parallel digital correlators for binary phase-shift keying DS-UWB transmission is presented. The proposed correlator structure operating at 55 MHz is shared for correlation operations in a searcher, a channel estimator, and the demodulator of a RAKE receiver. We also present a pseudo-random noise sequence generated with a primitive polynomial, $1+x^2+x^5$, for packet detection, automatic gain control, and initial timing acquisition. Simulation results show that the performance of the proposed parallel processing searcher employing the presented pseudo-random noise sequence outperforms that employing a preamble sequence in the IEEE 802.15.3a DS-UWB proposal.

  • PDF

SB-MAC : Energy efficient Sink node Based MAC protocol for Wireless Sensor Networks (무선 센서 네트워크 에서 에너지 효율적인 싱크노드 기반 MAC 프로토콜)

  • Jeon, Jun-Heon;Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.177-182
    • /
    • 2014
  • In this paper, we propose an energy efficient sink node based MAC protocol for Wireless Sensor Networks (WSNs). The proposed sink node-based MAC (SB-MAC) protocol uses a RB(rapid beacon) frame to save sender's energy consumption and to reduce transmission delay. The RB frame is a modified IEEE 802.15.4 beacon frame. The RB frame contains the length of the sender nodes data. Using this information other nodes except sender and receiver nodes can be stay sleep mode long time to reduce energy consumption. Results have shown that the SB-MAC protocol outperformed other protocols like X-MAC and RI-MAC in terms of packet delivery delay and energy consumption. The SB-MAC protocol is especially energy efficient for the networks with one sink node and many senders.

Development of a RADIUS WLAN Security System for Industrial Applications Based on WEB (WEB 기반의 기업용 RADIUS 무선랜 보안 시스템 개발)

  • Jeong, Yeon-Woo;Sohn, Jong-Yoon;Chun, Joong-Chang;Choi, Kyung-Sun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.599-603
    • /
    • 2016
  • Recently the wireless LAN system is substituting wired LAN system notably as the number of mobile users increases greatly along the advancement of technology. But the wireless LAN has a critical weakness in the security such as data leakage. Thus a safe security system is imperative to avoid threatening from hackers with offering the best convenience to inner users. In this research, we have developed a RADIUS wireless LAN security system for industrial applications, which performs the EAP authentication with the compatibility for any maker of wireless LAN. The system has interfaces based on WEB, providing DB access function for user management so that users can perform authentication of 802.1x in their computers.

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

The Characteristics of Piezoelectric Strian Constants on PNN-PZ-PT Ceramics (PNN-PZ-PT계 세라믹스의 압전변위특성)

  • 정수태;남효덕;조상희
    • Journal of the Korean Ceramic Society
    • /
    • v.26 no.6
    • /
    • pp.802-810
    • /
    • 1989
  • The temperature dependence of piezoelectric strain constant and the electric field induced strain are investigated as a function of PT in 0.5[xPT-(1-x)PZ]-0.5PNN ceramics. The piezoelectric strain constant d31 has the highest value(360$\times$10-12m/V) at PT=0.68. The temperature dependence of d31 is improved as Curie temperature of sample is increased, and the electric field dependence of induced strain is decreased with the coercive field increased. This ceramic system shows both piezoelectric effect and electrostrictive effect under the applied electric field. The piezoelectric of tetragonal phase is higher than that of rhombohedral phase, and the magnitude of electrostrictive constant is appeared in the order of morphotropic, rhombohedral and tetragonal phase. The piezoelectric strain constant with applied field must be considered theelectrostrictive effect due to 90$^{\circ}$domain wall displacements, and the displacement of bimorph type actuator agrees with the calulated value well.

  • PDF

Security Architecture for T4 Class Common Data Link

  • Lee, Sang-Gon;Lee, Hoon-Jae;Kim, Hyeong-Rag;Ryu, Young-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.63-72
    • /
    • 2017
  • In this paper, we propose a security architecture for HDLC-based T4 class common data link. The common data links are composed of point-to-point, multi-to-point, and point-to-multi mode. For multi-to-point mode, one node has a bundle of point-to-point links with different end-point on the other side of the links. Thus multi-to-point mode can be considered as a bundle of point-to-point mode. Point-to-multi mode is broadcasting link. For point-to-point mode we adopted robust security network scheme to establish a secure data link, and for multi-to-point mode we use broadcast encryption scheme based on ID-based cryptography to distribute encryption key for broadcasting message encryption. We also included MACsec technology for point-to-point data link security. Computational and communicational complexity analysis on the broadcast encryption have been done.

Korea information Security Agency (무선랜 침해사고 예방대책 연구)

  • 신동훈;신동명;고경희
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.466-468
    • /
    • 2004
  • 무선통신기술의 급속한 발달로 유.무선 기술을 이용한 네트워크 구축 및 서비스의 보급이 활발해지고 있다. 이러한 서비스 중에서 무선랜 서비스는 기존 유선 네트워크와의 호환성과 무선이 갖는 확장성으로 인해 많은 곳에서 널리 활용되고 있다. 현재 보급되고 있는 무선랜 제품은 802.1x, WPA 보안 표준을 구현한 제품들이 대부분을 차지하고 있으며, 최근 표준화가 완료된 802.11i 호환 제품들도 많이 보급될 것으로 예상된다. 또한 무선랜 통신의 고속화와 보안기술의 발전에 힘입어 유선구간에서 제공되던 많은 서비스들이 무선환경에서도 비교적 안전하게 서비스 될 것으로 예상된다. 그러나, 무선랜의 많은 장점에도 불구하고, 많은 기업과 기관에서 무선랜 설치를 망설이는 주요 이유 중의 하나는 무선랜의 보안치약성에 대한 우려 때문인 것으로 분석되고 있다. 물론 무선랜 구축을 위한 추가적인 비용 문제도 있지만, 특히 무선이 유선에 비해 보안이 상대적으로 취약하다는 문제를 제기하고 있다. 이에 따라 NIST, DoD 산하 ITRC 및 캐나다의 CSE 등에서는 무선랜 환경에서의 보안취약성 및 모범 사례들을 제시하고 있다. 국내의 경우에는 한국정보보호진흥원에서 무선랜 보안 운영 실태조사를 바탕으로 국내 무선랜 서비스 형태 및 구축방식에 따른 보안대책을 공표 하였으며, 일반인을 대상으로 한 안전 운영 가이드라인을 마련하고 있다. 본문에서는 국외 무선랜 보안 대책을 소개하고, 무선랜 환경에서의 침해사고를 예방하기 위한 국내 가이드라인의 주요 내용 및 방향을 제시한다.

  • PDF