• Title/Summary/Keyword: AP

Search Result 3,426, Processing Time 0.03 seconds

Detecting and Isolating a Cloned Access Point IEEE 802.11 (IEEE 802.11에서의 복제된 AP 탐지 및 차단 기법)

  • Go, Yun-Mi;Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.45-51
    • /
    • 2010
  • Appearance of a cloned AP(Access Point) causes MS(Mobile Station) to break an association with a normal AP(Access Point). If signal power of the cloned AP is stronger than that of the normal AP, MS associates with the cloned AP. Therefore, MS is easily exposed to attackers who installed the cloned AP. In this paper, we distinguish cloned AP from normal AP by using the association time and frame sequence number between normal AP and MS, then isolates the cloned AP. The simulation by NS-2 shows that our mechanism isolates efficiently a cloned AP and builds safer wireless LAN environment.

Key Establishment Scheme for Multicast CoAP Security (멀티캐스트 CoAP 보안을 위한 키 설정 기법)

  • Cho, Jung mo;Han, Sang woo;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.77-85
    • /
    • 2017
  • In this paper, we propose a key establishment scheme for multicast CoAP security. For multicast CoAP applications, a CoAP Request message from a CoAP client is sent to a group of CoAP servers while each CoAP server responds with a unicast CoAP Response message. In this case, the CoAP Request message should be secured with a group key common to both the CoAP client and servers, while a pairwise key(unicast key) should be employed to secure each CoAP Response message. In the proposed protocol, the CoAP client and the CoAP server establish the group key and the pairwise key using the ECDH in the initial CoAP message exchange process. The proposed protocol, which is highly efficient and scalable, can replace DTLS Handshake and it can support end-to-end security by setting pairwise keys.

조선 : KS-STEP

  • 김용대
    • Proceedings of the CALSEC Conference
    • /
    • 2000.08a
    • /
    • pp.115-126
    • /
    • 2000
  • □ Ship Structural Envelope : hull form(AP216), arrangements(AP215), structure(Ap218) □ Distributed Systems : piping(AP227), electrical(AP212), HVAC(AP227) □ Mission Subsystems/Equipment : mechanical(AP226), electronics(AP212), operation(AP234) outfit and furnishings (FunSTEP), weapons(중략)

  • PDF

Evaluation of General and Specific Combining Ability in Newly Synthesized Inbred Lines of Bivoltine Silkworm Bombyx mori L.

  • Goel, Ajay Kumar;Chandrashekharaiah, Chandrashekharaiah;Rao, Y. Uma Maheshwar
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.20 no.2
    • /
    • pp.79-85
    • /
    • 2010
  • Eight bivoltine inbred lines of silkworm Bombyx mori L. viz., AP8, AP10, AP17 and AP18 with marked female and plain male larvae and AP1, AP54, AP71 and AP72 with all plain larvae synthesized from Chinese commercial hybrids were evaluated for their general combining ability (gca), specific combining ability (sca) and reciprocal effects for eight quantitative traits. The line AP18 was found to be best general combiner by virtue of significant positive and positive gca effects for seven out of eight traits studied followed by the lines AP10, AP8 and AP17. Seven hybrids recorded significant positive and positive sca effects for all the traits under study reflecting the interaction of alleles, additive and non additive gene action and dominant effects expressed by genes. Among the 28 reciprocal hybrids, AP54$\times$AP18 and AP1$\times$AP17 revealed significant reciprocal effects for the six traits followed by AP54$\times$AP8 for five and AP10$\times$AP71 for four traits.

An Study on Abdominal Pain in Childhood according to Its Symptoms (소아(小兒) 복통(腹痛)에 관한 임상적(臨床的) 고찰(考察))

  • Kim Sung-Hee;Lee Seung-Yeon
    • The Journal of Pediatrics of Korean Medicine
    • /
    • v.15 no.2
    • /
    • pp.53-68
    • /
    • 2001
  • Purpose : This Study was conducted to evaluate clinical manifestations of abdominal pain(AP) in childhood according to its symptoms and to find out characteristic of children with abdominal pain. Methods : Pacients who visited Dong-Eui Oriental Medical hospital from August to November 2001 due to abdominal pain were included. According to questionaire and history taking abdominal pain was classified by its six subtype in the Oriental Pediatic Text Book and Dong Eui Bo Gam(東醫寶鑑). Result : According to the Oriental Pediatic Text Book, among 41 children, 31.7% had symptoms of AP caused by cold in internal organs of deficiency(臟腑虛冷腹痛), 29.3% had symptoms of AP caused by diet(食積腹痛), 19.5% had symptoms of AP caused by cold(寒腹痛), 9.8% had symptoms of AP caused by both cold and diet, 7.3% had symptoms of AP caused by internal diet and external cold(內食外寒腹痛), 2.4% had symptoms of AP caused by stagnation of Ki and stasis of blood(氣滯血瘀腹痛). There is no AP caused by parasites(蟲腹痛). Otherwise, according to Dong Eui Bo Gam, 43.9% had symptoms of AP caused by cold, 26.8% had symptoms of AP caused by diet, 9.8% had symptoms of AP caused by both cold and diet, 7.3% had symptoms of AP caused by fire(熱腹痛), 7.3% had symptoms of AP caused by phlegm(痰飮腹痛), 4.9% had symptoms of AP caused by stagnated blood(瘀血腹痛). Also There is no AP caused by parasites. Conclusion : 1. The type of AP in Childhood is different from AP in adults. AP in Childhood is most occured by cold of deficiency and food, and there is few AP caused by fire. Six subtype in Dong Eui Bo Gam prefer adults to children and It is more studied that what kind of subtype is proper for AP caused by stress or drugs. So the study on subclassification and clinical Manifestations of AP in Childhood is more performed.

  • PDF

Relaying Rogue AP detection scheme using SVM (SVM을 이용한 중계 로그 AP 탐지 기법)

  • Kang, Sung-Bae;Nyang, Dae-Hun;Choi, Jin-Chun;Lee, Sok-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.431-444
    • /
    • 2013
  • Widespread use of smartphones and wireless LAN accompany a threat called rogue AP. When a user connects to a rogue AP, the rogue AP can mount the man-in-the-middle attack against the user, so it can easily acquire user's private information. Many researches have been conducted on how to detect a various kinds of rogue APs, and in this paper, we are going to propose an algorithm to identify and detect a rogue AP that impersonates a regular AP by showing a regular AP's SSID and connecting to a regular AP. User is deceived easily because the rogue AP's SSID looks the same as that of a regular AP. To detect this type of rogue APs, we use a machine learning algorithm called SVM(Support Vector Machine). Our algorithm detects rogue APs with more than 90% accuracy, and also adjusts automatically detection criteria. We show the performance of our algorithm by experiments.

Modeling and Performance Evaluation of AP Deployment Schemes for Indoor Location-Awareness (실내 환경에서 위치 인식율을 고려한 AP 배치 기법의 모델링 및 성능 평가)

  • Kim, Taehoon;Tak, Sungwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.847-856
    • /
    • 2013
  • This paper presents an AP placement technique considering indoor location-awareness and examines its performance. The proposed AP placement technique is addressed from three performance metrics: location-awareness and AP-based wireless network performance as well as its cost. The proposed AP placement technique consists of meta-heuristic algorithms that yield a near optimal AP configuration for given performance metrics, and deterministic algorithms that improve the fast convergence of the near optimal AP configuration. The performance of the AP placement technique presented in this paper is measured under the environments simulating indoor space, and numerical results obtained by experimental evaluation yield the fast convergence of a near-optimal solution to a given performance metric.

Detecting Rogue AP using k-SVM method (k-SVM을 이용한 Rogue AP 탐지 기법 연구)

  • Lee, Jae-Wook;Lee, Si-Young;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.87-95
    • /
    • 2014
  • Under only authorized AP is allowable environment, rogue AP which is generated by a smartphone tethering can be a serious security breach. To solve rogue AP problem, this paper proposes classifying algorithm of Kernel Support Vector Machine using features of RTT data. Through our experiment, we can detect rogue AP from LTE mobile network.

AP-Initiated Flow Redirection Mechanism for AP Load Balancing in WLAN Environments (무선랜 환경에서 AP 로드 밸런싱을 위한 AP-개시 플로우 리다이렉션 메커니즘)

  • Kim, Mi-Hui;Chae, Ki-Joon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.65-73
    • /
    • 2009
  • IEEE802.11 Wireless LAN(WLAN) is being widely used in public space such as airport, and increases the networking boundary in campus and enterprise, and it has lastly attracted considerable attention for mesh network and converged network with other 3G mobile communication networks. In WLAN, load balancing among Access Points(AP) is an important issue for efficient resource management or supporting the Quality of Service(QoS) of traffic, but most researches focused on the AP selection in network entry or roaming of Stations(STA). In this paper, we propose an AP-Initiated Flow Redirection(FR) for AP load balancing by monitoring AP's availability in the true sense. When the AP's resource becomes almost saturated, that is used more than a specific threshold, the AP queries the roaming possible neighbor APs about their availability and calculates the distribution of traffic load with statistical methods such as entropy or chi-square. Finally, the AP decides flows and new APs for redirection and performs it. Our simulation results show that our FR mechanism increases the performance in the various views.

  • PDF

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.