• 제목/요약/키워드: IEEE 802. 1x

검색결과 58건 처리시간 0.023초

A Method of Authenticating WLAN APs for Smartphones (스마트폰을 위한 무선 AP 인증 방법)

  • Shin, DongOh;Kang, Jeonil;Nyang, DaeHun;Lee, Sokjoon;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제39B권1호
    • /
    • pp.17-28
    • /
    • 2014
  • The increase of smartphone users have made mobile carriers offload increasingly congested traffic of 3/4G by providing Wi-Fi hot-spots in the public places such as coffee shops and subway stations. In the traditional authentication in WLAN, the users should convince the service providers that they are valid customers before they use WLAN services. Since the authentication protocol is designed for service providers. Even with the mutual authentication based on the IEEE 802.1X, which is supported by IEEE 802.11 standard, it is difficult to be convinced of that the service providers really have installed the WLAN APs, which users are confronted with. An attacker can install rogue APs that masquerade as legitimate APs by copying the SSID, MAC address, etc. in order to obtain users' private information. In this paper, we introduce a method of authenticating legitimate APs for smartphone users. And we show our proposal can be well utilized for the current Wi-Fi hot-spots as a security plug-in and prove it through our experiments.

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제32권8B호
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).

Research of Real Time Mutual Authentication System in Wireless Network (무선 네트워크상에서 실시간 상호인증시스템에 관한 연구)

  • Jung, Don-Chul;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제10권11호
    • /
    • pp.1996-2001
    • /
    • 2006
  • Open System Authentication Method, Shared Key Method, Mac Based Authentication Method are very hard to use in wireless network that needs security. So now, many researches have been performed about 802.1x and user authentication method applying PKI. but certificate verification protocol has been used abolished list called CRL since it's first usage of PKI, there were still has a problem about distribution point. This paper applied CVS to use CA direct not to use CRL and OSCP server in order to improve this problems. Also It suggested the system that can make authentication steps more shorter using authentication server and Mutual authentication system by public certificate(small size/low speed wireless terminal can access to wireless network fast and safely)

TLSA: A Two Level Scheduling Algorithm for Multiple packets Arrival in TSCH Networks

  • Asuti, Manjunath G.;Basarkod, Prabhugoud I.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권8호
    • /
    • pp.3201-3223
    • /
    • 2020
  • Wireless communication has become the promising technology in the recent times because of its applications in Internet of Things( IoT) devices. The IEEE 802.15.4e has become the key technology for IoT devices which utilizes the Time-Slotted Channel Hopping (TSCH) networks for the communication between the devices. In this paper, we develop a Two Level Scheduling Algorithm (TLSA) for scheduling multiple packets with different arrival rate at the source nodes in a TSCH networks based on the link activated by a centralized scheduler. TLSA is developed by considering three types of links in a network such as link i with packets arrival type 1, link j with packets arrival type 2, link k with packets arrival type 3. For the data packets arrival, two stages in a network is considered.At the first stage, the packets are considered to be of higher priority.At the second stage, the packets are considered to be of lower priority.We introduce level 1 schedule for the packets at stage 1 and level 2 schedule for the packets at stage 2 respectively. Finally, the TLSA is validated with the two different energy functions i.e., y = eax - 1 and y = 0.5x2 using MATLAB 2017a software for the computation of average and worst ratios of the two levels.

Wireless LAN Security Solutions for Secure Wireless Communications

  • Kim, Su-Yong;Ahn, Duck-Ki;Roh, Jae-Sung;Oh, Chang-Reon;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • 제1권4호
    • /
    • pp.183-188
    • /
    • 2003
  • The $4^{th}$ generation mobile communications, through several radio access networks such as WLAN, Bluetooth, UMTS, GPRS, CDMA 1X, and IMT-2000 in the same area offering different type of coverage, will support interactive multimedia services in additions to wider bandwidths, higher bit rates, and service portability. Regardless of various radio access networks, they will also support robust security mechanisms, as well as seamless mobility and common authentication. In this paper, we give an overview of WLAN security and examine its security problems. We also explain the enhanced security schemes, such as port-based authentication, EAP, and IEEE 802.1X. For secure wireless communications, several possible security solutions are offered and evaluated in various respects to improve WLAN security. This paper will make a contribution to provide more secure wireless communications to cellular operators embracing WLAN technology as a means to generate new revenues based on data services.

Dual-band Monopole Antenna with Half X-slot for WLAN (절반의 X-슬롯을 가진 무선랜용 이중대역 모노폴 안테나)

  • Shin, Dong-Gi;Lee, Young-Soon
    • Journal of Advanced Navigation Technology
    • /
    • 제22권5호
    • /
    • pp.449-455
    • /
    • 2018
  • For the size reduction, we propose a microstrip-fed monopole antenna with half X-slot in the radiation patch and cover WLAN dual band 2.4 GHz band (2.4 ~ 2.484 GHz) and 5 GHz band (5.15 ~ 5.825 GHz). The frequency characteristics such as impedance bandwidth and resonant frequencies were satisfied by optimizing the numerical values of various parameters, while the reflection loss in 5 GHz was improved by using defected ground structure (DGS). The proposed antenna is designed and fabricated on a FR-4 substrate with dielectric constant 4.3, thickness of 1.6 mm, and size of $24{\times}41mm^2$. The measured impedance bandwidths (${\mid}S_{11}{\mid}{\leq}-10dB$) of fabricated antenna are 450 MHz (2.27 ~ 2.72 GHz) in 2.4 GHz band and 1340 MHz (4.79 ~ 6.13 GHz) in 5 GHz band which sufficiently satisfied with the IEEE 802. 11n standard in dual band. In particular, radiation patterns which are stable as well as relatively omni-direction could be obtained, and the gain of antennas in each band was 1.31 and 1.98 dBi respectively.

A Security Mechanism in support of Proactive Handoff in Wireless LAN Environment (무선랜 환경에서 Proactive Handoff를 위한 보안 방법론)

  • 오남호;정병호;조기환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2001년도 가을 학술발표논문집 Vol.28 No.2 (1)
    • /
    • pp.631-633
    • /
    • 2001
  • 휴대용 컴퓨터가 널리 보급됨에 따라 장소에 상관없이 네트워크 망에 연결시킬 수 있는 수단으로 무선 랜의 필요성이 증대되고 있다. 이에 따른 정보보호 문제 또한 중요한 현안으로 대두되고 있다. 현재 IEEE 802.1X를 중심으로 무선랜에서의 향상된 정보보호 솔루션을 제공하기 위한 노력이 진행 중에 있다. 하지만, 무선 랜 환경에서 안전하고 빠른 handoff를 지원해 주기 위한 방안은 부족한 상황이다. 이러한 필요성에 따라 본 논문에서는 무선 LAN환경에서 빠른 handoff를 제공하는 Proactive handoff를 지원하기 위한 안전만 보안 방법론을 제안한다. 이 때 키 교환 메커니즘으로 EAP-TLS를 이용한 방법을 토대로 한다.

  • PDF

SB-MAC : Energy efficient Sink node Based MAC protocol for Wireless Sensor Networks (무선 센서 네트워크 에서 에너지 효율적인 싱크노드 기반 MAC 프로토콜)

  • Jeon, Jun-Heon;Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제18권1호
    • /
    • pp.177-182
    • /
    • 2014
  • In this paper, we propose an energy efficient sink node based MAC protocol for Wireless Sensor Networks (WSNs). The proposed sink node-based MAC (SB-MAC) protocol uses a RB(rapid beacon) frame to save sender's energy consumption and to reduce transmission delay. The RB frame is a modified IEEE 802.15.4 beacon frame. The RB frame contains the length of the sender nodes data. Using this information other nodes except sender and receiver nodes can be stay sleep mode long time to reduce energy consumption. Results have shown that the SB-MAC protocol outperformed other protocols like X-MAC and RI-MAC in terms of packet delivery delay and energy consumption. The SB-MAC protocol is especially energy efficient for the networks with one sink node and many senders.

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • 제6권12호
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

A context-Aware Smart Home Control System based on ZigBee Sensor Network

  • Khan, Murad;Silva, Bhagya Nathali;Jung, Changsu;Han, Kijun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.1057-1069
    • /
    • 2017
  • The applications of Wireless Sensor Networks (WSN) are progressively adopting for various smart home services such as home automation, controlling smart home household appliances, constrained application services in a smart home, etc. However, enabling a seamless and ubiquitous WSN communication between the smart home appliances is still a challenging job. Therefore, in this paper, we propose a smart home control system using an Actuator based ZigBee networking (AZNET). The working of the proposed system is further divided into three phases, 1) an interference avoidance system is adopted to mitigate the effect of interference caused due to the co-existence of IEEE 802.11x based wireless local area networks (WLAN) and WSN, 2) a sensor-based smart light control system is used to fulfill the light requirement in the smart home using the sunlight with light source, and 3) an autonomous home management system is used to regulate the usage time of the electronic appliances in the smart home. The smart is tested in real time environment to use the sunlight with light sources in a various time of the day. Similarly, the performance of the proposed smart home is verified through simulation using C# programming language. The results and analysis revealed that the proposed smart home is less affected by the interference and efficient in reducing the energy consumption of the appliances available in the smart home scenario.