• Title/Summary/Keyword: WEP

Search Result 89, Processing Time 0.043 seconds

Comparison of Effects of Oral Health Program and Walking Exercise Program on Health Outcomes for Pregnant Women (구강건강 프로그램과 걷기운동 프로그램이 임신중기 초임부의 건강결과에 미치는 효과 비교)

  • Park, Hae-jin;Lee, Haejung
    • Journal of Korean Academy of Nursing
    • /
    • v.48 no.5
    • /
    • pp.506-520
    • /
    • 2018
  • Purpose: To compare the effects of the Interaction Model of Client Health Behavior (IMCHB)-based oral health program (OHP) and walking exercise program (WEP) on oral health behaviors, periodontal disease, physical activity, and psychological indicators (depression, stress, and quality of life) in pregnant women. Methods: A nonequivalent control group pretest-posttest design was adopted to compare the effects of a 12-week OHP and WEP on pregnant women (n=65). Pregnant women were randomly assigned to the oral health group (OHG; n=23), walking exercise group (WEG; n=21), or control group (CG; n=21). Data were analyzed by the ${\chi}^2-test$, Fisher's exact test, Scheffe test, and repeated measures ANOVA, using the Statistical Package for the Social Sciences for Windows (version 21.0). Results: The OHG and WEG showed significant improvements in oral health behaviors, periodontal disease, and psychological indicators as compared to the CG. The WEG showed significant improvement in physical activity as compared to the OHG and CG. Conclusion: These findings indicate that the IMCHB-based OHP and WEP were effective in improving periodontal disease, physical activity, and psychological indicators. However, further studies are needed to identify the positive effects of the OHP and WEP on birth outcomes.

Hacking Countermeasures for Wireless Internet Service (무선 인터넷 서비스를 위한 해킹 대응 방안)

  • Kook, Jung Gak;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.6 no.3
    • /
    • pp.79-90
    • /
    • 2016
  • Wireless internet service is an important factor to support all industries. In order to connect and use the smart phones or the laptop via a wireless Internet connection, it has been increasing the hacking risks associated with it. As information spills through the DNS address modulation of the Internet router, hacking threats through a wireless router is present. In this paper, we are dealing with the hacking technique utilizing the overall vulnerability of a wireless LAN. We analyzed the need for the wireless LAN security through WEP encryption algorithm and the improved encryption algorithm. In addition, we presented a countermeasure against these hacking technologies which is WEP Crack using wireless vulnerability hacking technology, DDoS attacks, DNS Spoofing.

An Efficient Authentication Protocol Using Single Bit Synchronization for Wireless LAN Environment (단일 Bit 동기화를 이용한 무선 LAN 환경에서의 효율적인 인증 프로토콜)

  • Jo Hea Suk;Youn Hee Yong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.747-754
    • /
    • 2004
  • Today, wireless LANs are widely deployed in various places such as corporate office conference rooms, industrial warehouses, Internet-ready classrooms, etc. However, new concerns have been raised regarding suity. Currently, both virtual private network(VPN) and WEP are used together as a strong authentication mechanism. While security is increased by using VPN and WEP together, unnecessary redundancy occurs causing power consumption increase and authentication speed decrease in the authentication process. In this paper a new synchronization protocol for authentication is proposed which allows simple authentication, minimal power consumption at the mobile station, and high utilization of authentication stream. This is achieved by using one bit per a frame authentication, while main authentication process including synchronization is handled by access points. Computer simulation reveals that the proposed scheme significantly improves the authentication efficiency in terms of the number of authenticated frames and authentication speed compared with an earlier protocol employing a similar authentication approach.

A New Rekeying Scheme for 802.11 Wireless Packets Transmission (802.11 무선패킷 전송을 위한 새로운 Rekeying 스킴)

  • Phang, Seong-Yee;They, Yu-Shu;Yang, Chi-Shian;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.274-277
    • /
    • 2008
  • Rekeying is the process of changing the encryption key of an ongoing communication. The main objective is to limit the amount of data encrypted with the same key. The IEEE 802.11 standard defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. MAC at sender encrypts the payload (frame body and CRC) of each 802.11 frame before transmission using RC4 stream cipher. MAC at receiver decrypts and passes data to higher level protocol. WEP uses symmetric key stream cipher (RC4) where same key will be used for data encryption and decryption at the sender and the receiver. WEP is not promising with the advancement of the wireless technology existing today. We propose to use the existing information to define the security attributes. This will eliminate the steps that regenerated keys have to be sent to each other over certain period. The rekeying scheme is according to the number of bytes transmitted. Therefore, even the attacker has recorded the packets, it will be insufficient information and time for the attacker to launch the attacks as the key is not deterministic. We develop a packet simulation software for packet transmission and simulate our propose scheme. From the simulation, our propose scheme will overcome the weak WEP key attack and provide an alternative solution to wireless packet transmission. Besides that, our solution appears to be a software approach where only driver updates are needed for the wireless client and server.

  • PDF

Water Cycle Simulation for the Dorimcheon Catchment Using WEP Model (WEP 모형을 이용한 도림천 유역 물순환 모의)

  • Lee, Seung-Jong;Kim, Young-Oh;Lee, Sang-Ho;Lee, Kil-Seong
    • Journal of Korea Water Resources Association
    • /
    • v.38 no.6 s.155
    • /
    • pp.449-460
    • /
    • 2005
  • In this study, a WEP (Water and Energy transfer Processes) model was used to simulate the water cycle of the Dorimcheon catchment which suffers from the distorted water cycle as a typical urban catchment. Two different land uses in the past (i.e. 1975) and at present (i.e. 2000) were incorporated into the simulation to investigate the runoff characteristics resulting from the increase of the impervious ratio due to urbanization. The simulation results show that the concentration time is decreased and the peak discharge and the total runoff are increased by urbanization while the infiltration and baseflow are reduced. In addition, the effects of infiltration trenches and permeable pavements were also simulated to search for alternatives that can restore the distorted water cycle. The simulation results prove that the installation of both alternatives can restore the runoff characteristics to that prior to urbanization.

Influence of Perilla frutescens var. acuta Water Extract on the Shelf Life and Physicochemical Qualities of Cooked Beef Patties

  • Lee, Cheol Woo;Choi, Hyun Min;Kim, Su Yeon;Lee, Ju Ri;Kim, Hyun Joo;Jo, Cheorun;Jung, Samooel
    • Food Science of Animal Resources
    • /
    • v.35 no.3
    • /
    • pp.389-397
    • /
    • 2015
  • This study investigated the effects of Perilla frutescens var. acuta water extract (WEP) on the shelf life and physicochemical qualities of cooked beef patties. The WEP contained phenolic compounds (80.65 mg gallic acid equivalents/g) and had half-maximal effective concentrations of 0.437 and 4.509 mg/mL for scavenging of DPPH and ABTS+ radicals, respectively. Treatment with 0.6% WEP inhibited the growth of Escherichia coli O157:H7 (p<0.05). Based on the result of the antioxidative potential and antimicrobial potential of WEP, beef patties were prepared with three treatment groups: (1) beef patties without added antioxidant (control); (2) beef patties with 0.02% ʟ-ascorbic acid (BAA); and (3) beef patties with 0.6% WEP (BWEP). The pH and cooking loss of BWEP were lower and higher than those in the control, respectively (p<0.05). When cooked beef patties were stored for 21 d at 4℃, the total number of aerobic bacteria in BWEP was lower than those in the control on all days except day 14 (p<0.05). The TBARS values in BWEP were lower than those of controls on days 7, 14, and 21 (p<0.05). Compared to control and BAA, BWEP had lower L* and b* values and higher a* values throughout the storage period (p<0.05). Except on day 0, acceptability was higher in BWEP than in control and BAA (p<0.05). According to results, WEP can be used as a natural ingredient that improves the shelf life and sensorial qualities of meat products.

Grid Size Effects in Distributed Hydrological model (분포형 수문모형의 격자크기가 모의결과에 미치는 영향 분석)

  • Noh, Seong-Jin;Kim, Hyeon-Jun;Jang, Cheol-Hee
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.654-658
    • /
    • 2005
  • 최종 유출지점에서의 해석 결과뿐 아니라 해석하고자 하는 유역내의 시간적, 공간적 수문 요소 분포 특성을 이해하기 위해서는 분포형 수문모형을 적용해야 하며, 최근 이에 대한 활용이 늘어나고 있다. 본 연구에서는 분포형 수문모형인 WEP 모형을 서로 다른 크기의 격자단위로 해석하여 그 결과를 비교하였다. 격자는 가로, 세로 50m, 200m격자를 사용하였으며, 각각의 연간 물수지, 하천 유출, 모의 시간, 수문 요소의 공간분포 양상 등을 비교, 분석하였다.

  • PDF

Evaluation of Infiltration Trench Effects on Hydrologic Cycle in a Urbanized Watershed (침투 트렌치 시설이 도시유역 물순환에 미치는 영향 평가)

  • Noh, Seong-Jin;Kim, Hyeon-Jun;Jang, Cheol-Hee
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.715-719
    • /
    • 2006
  • 청계천 유역에 침투 트렌치 설치시 영향을 분포형 모형인 WEP 모형을 통하여 평가하였다. 침투 트렌치는 홍수 저감 보다는 물순환 개선에 효과가 있으나, 갈수량 증가량이 대부분 합류식 하수관에 의해 배제되는 것으로 모의되었다. 물순환 개선을 위해서는 침투 트렌치 설치에 앞서 합류식 하수관 시설의 재정비 등 유역내 저류량이 하천으로 이어질 수 있도록 하는 노력이 필요할 것으로 판단된다.

  • PDF

Software Implementation of WPA Wireless LAN Access Point (소프트웨어 구현을 통한 WPA 지원 무선 랜 액세스포인트 개발)

  • 오경희;강유성;정병호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.667-669
    • /
    • 2003
  • IEEE 802.11 표준에 포함되어 있는 WEP 방식의 무선 랜 보안이 취약한 것으로 알려진 후 WEP을 대치할 새로운 표준이 802.1li 워킹그룹에 의하여 작성되고 있다. Wi-Fi는 중간단계로서 802.1li의 일부만을 구현하는 WPA 규격을 만들었다. 이 규격은 기존의 하드웨어를 그대로 사용하면서 소프트웨어와 펌웨어 갱신만으로 기존의 무선랜 취약점을 제거할 수 있게 한다. WPA규격을 준수하는 무선 랜 액세스포인트의 개발을 위하여 기존의 액세스포인트 디바이스 드라이버를 WPA를 지원하도록 수정하였으며, 사용자 인증 및 키 교환을 수행하는 소프트웨어를 설계 및 개발하였다.

  • PDF

Analysis of Secure Protocol for Hight Speed Wireless LAN Communication (고속 무선랜 통신을 위한 보안 프로토콜에 관한 연구)

  • 정우길;박경수;이영철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.265-269
    • /
    • 2002
  • 본 논문에서는 무선랜 시스템에서 보안상의 취약점을 해소하기 위해 적용되고 있는 보안 기법들에 관해 분석하였다. WLAN에서 적용되고 있는 보안규정 WEP는 RC4 스트림 키퍼의 특징에서 오는 IV Reuse 문제 및 ICV를 생성하는 CRC-32의 선형특성에 따른 문제를 분석하고 현재 사용되는 보안기법인 액세스컨트롤의 강화와 WEP 키관리 및 VPN에서의 사용자 인증알고리즘 및 데이터 암호화기술을 분석하고, 802.11a에서 보안모델의 나아갈 방향을 제시하였다.

  • PDF