• Title/Summary/Keyword: Campus WLAN

Search Result 7, Processing Time 0.019 seconds

Indoor Positioning Using WLAN Signal Strength (무선랜의 신호세기를 이용한 실내 측위)

  • Kim, Suk-Ja;Lee, Jin-Hyun;Jee, Gyu-In;Lee, Jang-Gyu;Kim, Wuk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.8
    • /
    • pp.742-747
    • /
    • 2004
  • Outdoors we can easily acquire our accurate location by GPS. However, the GPS signal can't be acquired indoors because of its weak signal power level. Adequate positioning method is demanded for many indoor positioning applications. At present, wireless local area network (WLAN) is widely installed in various areas such as airport, campus, and park. This paper proposes a positioning algorithm using WLAN signal strength to provide the position of the WLAN user indoors. There are two methods for WLAN based positioning, the signal propagation method uses signal strength model over space and the empirical method uses RF power propagation database. The proposed method uses the probability distribution of the power propagation and the maximum likelihood estimation (MLE) algorithm based on power strength DB. Test results show that the proposed method can provide reasonably accurate position information.

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

AP-Initiated Flow Redirection Mechanism for AP Load Balancing in WLAN Environments (무선랜 환경에서 AP 로드 밸런싱을 위한 AP-개시 플로우 리다이렉션 메커니즘)

  • Kim, Mi-Hui;Chae, Ki-Joon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.65-73
    • /
    • 2009
  • IEEE802.11 Wireless LAN(WLAN) is being widely used in public space such as airport, and increases the networking boundary in campus and enterprise, and it has lastly attracted considerable attention for mesh network and converged network with other 3G mobile communication networks. In WLAN, load balancing among Access Points(AP) is an important issue for efficient resource management or supporting the Quality of Service(QoS) of traffic, but most researches focused on the AP selection in network entry or roaming of Stations(STA). In this paper, we propose an AP-Initiated Flow Redirection(FR) for AP load balancing by monitoring AP's availability in the true sense. When the AP's resource becomes almost saturated, that is used more than a specific threshold, the AP queries the roaming possible neighbor APs about their availability and calculates the distribution of traffic load with statistical methods such as entropy or chi-square. Finally, the AP decides flows and new APs for redirection and performs it. Our simulation results show that our FR mechanism increases the performance in the various views.

  • PDF

Study on the Performance of Wireless Local Area Network in a Multistory Environment with 8-PSK TCM

  • Suwattana, Danai;Santiyanon, Jakkapol;Laopetcharat, Thawan;Charoenwattanaporn, Monton;Goenchanart, Ut;Malisuwan, Settapong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.549-551
    • /
    • 2002
  • A Wireless Local Area Network (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN with in a building or campus. However, communications in an indoor environment present problems not encountered in outdoor wireless communication systems. Since cellular type systems are interference limited, the indoor environment is more hostile than the outdoor environment due to the lower propagation constant. In this paper, the equation for the signal to interference ratio in a multistory building will be derived. Knowing the S/I ratio, the floor frequency reuse can be determined. Finally, the simulation in this research is designed to study the performance (BER) of WLAN system in the multistory environment by applying the 8-PSK Trellis Coded modulation technique. The procedure allows a quick evaluation of BER in Wireless LAN system due to the co-channel interference.

  • PDF

The Risk of Wardriving Attack Against Wireless LAN and its Counterplan (무선랜 워드라이빙 공격의 위험성과 대응방안)

  • Choi, Young-Nam;Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2121-2128
    • /
    • 2009
  • The application range of IEEE 802.11 wireless LAN has rapidly expanding from campus, enterprise to the public network of Hot Spot area due to the advantages of easiness of construction, mobility of wireless client station, convenience of usage and so on. However the security of WLAN(Wireless LAN) is vulnerable inherently because of using RF as a medium, and so the dangers of infringement of personal information and inside data of enterprises have increased and wardriving attack searching for security vulnerability in wireless LAN has become more serious especially. In this paper, we find out the overview of various procedures and preparatory stages for wardriving attack against wireless LAN, and propose complementary methods to prevent information infringement accidents from wardriving attack in wireless LAN. For this purpose, we make an equipment which is suitable for wardriving in wireless LAN and show security vulnerability of AP(Access Point) operation in WLAN around Yangjae-Dong in Seoul as a result of using the equipment.

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

Measurements and Analysis of Fingerprinting Structures for WLAN Localization Systems

  • Al KhanbashI, Nuha;Al Sindi, Nayef;Ali, Nazar;Al-Araji, Saleh
    • ETRI Journal
    • /
    • v.38 no.4
    • /
    • pp.634-644
    • /
    • 2016
  • Channel-based radio-frequency fingerprinting such as a channel impulse response (CIR), channel transfer function (CTF), and frequency coherence function (FCF) have been recently proposed to improve the accuracy at the physical layer; however, their empirical performance, advantages, and limitations have not been well reported. This paper provides a comprehensive empirical performance evaluation of RF location fingerprinting, focusing on a comparison of received-signal strength, CIR-, CTF-, and FCF-based fingerprinting using the weighted k-nearest neighbor pattern recognition technique. Frequency domain channel measurements in the IEEE 802.11 band taken on a university campus were used to evaluate the accuracy of the fingerprinting types and their robustness to human-induced motion perturbations of the channel. The localization performance was analyzed, and the results are described using the spatial and temporal radio propagation characteristics. In particular, we introduce the coherence region to explain the spatial properties and investigate the impact of the Doppler spread in time-varying channels on the time coherence of RF fingerprint structures.