• Title/Summary/Keyword: WPA2

Search Result 21, Processing Time 0.025 seconds

Review on the Protected Areas Issues within Mid-Long Term National Plans for Territory and Environment of Korea; Focus on the "Biodiversity 2011-2020 Strategic Targets" and "Protected Areas Decision" (우리나라 국토 및 환경 분야 중장기 국가계획의 보호지역 관련 내용 고찰 - "생물다양성협약 2011~2020 전략목표" 및 "보호지역 결정문" 내용을 중심으로-)

  • Heo, Hag Young
    • Journal of Environmental Policy
    • /
    • v.11 no.4
    • /
    • pp.3-37
    • /
    • 2012
  • In perspective of biodiversity conservation and protected areas (PAs), the aims of the study are to review the mid-long term national plans, which deal with national territory and environment in Korea, and to find out the way to improve this issue. Key issues were drawn by referring "Biodiversity 2011-2020 Strategic Targets" and "Protected Area Decision" in CBD CoP-10 and 7 National comprehensive or basic Plans were reviewed. Quoting Biodiversity 2011-2020 Strategic Target 5, "By 2020, the rate of loss of all natural habitats, including forests, is at least halved and where feasible brought close to zero, and degradation and fragmentation is significantly reduced", most of national plans included various methods such as "No Net Loss of Green", "No Net Loss of Wetlands", and so on. Regarding the target 11, "By 2020, at least 17% of terrestrial and inland water, and 10% of coastal and marine areas, ecologically representative and well connected systems of PAs and other effective area-based conservation measures, and integrated into the wider landscape and seascapes", 15% by 2015 was set up as a target of total PAs in Korea and 13% by 2015 or 2020 was set up as a target of coastal and marine PAs. CBD CoP-10 Decision X/31 (Protected Areas) invites parties to develop a national long-term action plan for the implementation of PoWPA and describes 10 issues that need greater attention. National action plan for the implementation of PoWPA doesn't be mentioned at any national plans even PoWPA. Regarding the 10 issues, most of issues were well reflected within various national plans, however there is still a need to improve the details and corelation between plans. Particularly, in terms of management effectiveness evaluation (MEE), there was no national plan to directly deal with MEE even though CBD invites parties to work towards assessing 60% of the total PAs by 2015. Based on the review results, below 4 items were suggested; (1)"The Comprehensive Plan of the National Territory" needs more attention on the Biodiversity Conservation and PAs, (2)Consider to establish "National PA System Plan" embedded into "the Comprehensive Plan of National Environment", (3)Establish a "National Action Plan for the implementation of PoWPA", (4)Improve the National Plans through linking with Biodiversity 2011-2020 Strategic Targets and relevant PA key issues.

  • PDF

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

Face Region Detection and Verification using both WPA and Spatially Restricted Statistic (공간 제약 특성과 WPA를 이용한 얼굴 영역 검출 및 검증 방법)

  • Song, Ho-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.542-548
    • /
    • 2006
  • In this paper, we propose a face region detection/verification method using wavelet packet analysis and structural statistic for frontal human color image. The method extracts skin color lesions from input images, first. and then applies spatial restrictive conditions to the region, and determines whether the region is face candidate region or not. In second step, we find eye region in the face candidate region using structural statistic for standard korean faces. And in last step, the face region is verified via wavelet packet analysis if the face torture were satisfied to normal texture conditions.

Distribution of Fish Species in Wetland Protected Areas in South Korea

  • Chu, Yeounsu;Yoon, Jungdo;Cho, Kwang-Jin;Kim, Mijeong;Lim, Jeongcheol;Lee, Changsu
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.2 no.1
    • /
    • pp.42-52
    • /
    • 2021
  • In order to secure basic data on biodiversity for wetland conservation and management used the data from Wetland Protected Area surveys conducted in South Korea (2015-2019) to analyze the distribution of fish from a total of 15 orders, 45 families, 134 species, and 12,972 individuals. The predominant species identified were Zacco platypus (Temminck and Schlegel) (19.47%) and Zacco koreanus (Kim, Oh and Hosoya) (8.16%). Of all emergent species, 52.9% (n=71 species) were freshwater species, 26.9% (n=36) were brackish species, 3.0% (n=4) were migratory species, 27% (n=36) were marine species, and 9.0% (n=12) were riffle benthic species. Overall, 5.2% (n=7 species) were endangered species, 3.0% (n=4) were exotic species, and 23.1% (n=31) were Korean endemic species. The eight identified Wetland Protected Areas (WPA) were classified based on their habitat characteristics and on the analysis of their emergent fish communities, as estuarine (n=2), coastal dune (n=1), marsh (n=2), stream (n=2), and stream-marsh (n=1) types. The environmental factors revealed to have the greatest influence on the species diversity of emergent fish were maintenance and repair, installation of reservoirs, and construction of artificial wetlands around them. The present study offers basic information on the diversity of fish species in different Wetland Protected Area types that can be used to inform conservation and management decisions for WPA.

A Secure WLAN Authentication Scheme

  • Singh, Rajeev;Sharma, Teek Parval
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.3
    • /
    • pp.176-187
    • /
    • 2013
  • Message replay, malicious Access Point (AP) associations and Denial of Service (DoS) attacks are the major threats in Wireless LANs. These threats are possible due to a lack of proper authentication and insecure message communications between wireless devices. Current wireless authentication & key exchange (AKE) schemes and security protocols (WEP, WPA and IEEE 802.11i) are not sufficient against these threats. This paper presents a novel Secure WLAN Authentication Scheme (SWAS). The scheme introduces the delegation concept of mobile authentication in WLANs, and provides mutual authentication to all parties (Wireless Station, Access Point and Authentication Server). The messages involved in the process serve both authentication and key refreshing purposes. The scheme enhances the security by protecting the messages through cryptographic techniques and reduces the DoS impact. The results showed that cryptographic techniques do not result in extra latencies in authentication. The scheme also reduces the communication cost and network overhead.

  • PDF

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

Retardation Analysis of Plastic Optic Lens according to Injection Speed Variation (사출속도 변화에 따른 플라스틱 광학렌즈의 위상차 해석)

  • Park, Soo-Hyun;Kim, Tae-Kyu;Kwak, Tae-Soo
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.14 no.2
    • /
    • pp.93-98
    • /
    • 2015
  • This study focuses on simulation technology in the injection molding process for plastic optic lenses. The CAE program 3D TIMON was used to predict retardation, flow patterns and warpage deformation. The results were compared to the results of optic lenses as measured using the WPA-100 retardation measurement device with injection molding CAE for retardation predictions. According to the analysis and measured results, the distributions of retardation between the CAE results and the measurement results were similar. It was also confirmed that varying the injection speed had an effect on the injection pressure, warpage deformation and retardation distribution. As the injection speed increases, the injection pressure also increases and warpage deformation decreases. However, as the injection speed increases, the retardation distribution deteriorates.

Analysis of IoT Security in Wi-Fi 6 (Wi-Fi 6 환경에서의 IoT 보안 분석)

  • Kim, HyunHo;Song, JongGun
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.1
    • /
    • pp.38-44
    • /
    • 2021
  • Wi-Fi provides some low-power connection solutions that other Bluetooth cannot provide, and at the same time brings many benefits. First, there is a potentially higher data rate: it can reach 230mbps. Wi-Fi coverage is also wider than competitors, and its operating frequency is also 5GHz, which is much less congested than 2.4GHz. Finally, it also supports IP networks, which is important if you want to send data to the cloud without complexity. The 802.11ac standard of the previous generation still accounts for most shipments (80.9%) and revenue (76.2%). However, there is a limit to accepting IoT devices that will continue to increase significantly in the future. To solve this problem, the new Wi-Fi 6 standard is expected to be the solution (IEEE 802.11ax) which is quickly becoming the main driving force of the wireless local area network (WLAN) market. According to IDC market research analysts, in the first quarter of 2020, independent access points (APs) supported by Wi-Fi 6 accounted for 11.8% of shipments, but 21.8% of revenue. In this paper, we have compared and analyzed the IoT connectivity, QoS, and security requirements of devices using Wi-Fi 6 network.

A Review on the International Trends for Establishing Post-2020 National Targets Relevant to Protected Areas - Focused on the CBD Decisions and Aichi target-11 Achievement Status - (Post-2020 국가 보호지역 목표 설정을 위한 국제동향 고찰 - 생물다양성협약 결정문 및 글로벌 목표 성취현황 분석을 중심으로 -)

  • Heo, Hag Young
    • Korean Journal of Environment and Ecology
    • /
    • v.34 no.6
    • /
    • pp.601-609
    • /
    • 2020
  • This study aims to draw suggestions for establishing the Post-2020 national policy direction and goals related to protected areas in Korea by analyzing the trends of major discussion issues on protected areas in the Convention on Biological Diversity (CBD) and reviewing the achievement progress of the Aichi target-11. Regarding the CBD decisions on protected areas, two decisions (Decisions II/7 and II/8) were adopted in 1995, and then the Program of Work on Protected Areas (PoWPA), which presented an ideal blueprint for protected areas, was adopted at the 7th Conference of the Parties (COP) in 2004. At the 10th COP in 2010, the "Strategic Plan for Biodiversity 2011-2020 and the Aichi Biodiversity Target" (Decision X/2) was adopted along with the Decision X/31, which presented ten key issues related to protected areas. The global outcomes of the Aichi Target-11 include 15% of the earth's land area and 7.4% of the ocean being designated as protected areas. In Korea, 16.63% of the land and 2.12% of the ocean have been designated as protected areas. However, the outcomes of the effective and equitable management, protection of areas important to biodiversity and ecosystem services, and identifying "Other effective area-based conservation measures" (OECMs) and linking them with protected areas have been found to be significantly short of global goals. The first draft of the Post-2020 Global Biodiversity Framework (Post-2020 GBF) prepared in January 2020 presented multi-step objectives. They included protecting at least 60% of particularly important sites for biodiversity through protected areas and other effective area-based conservation measures, at least 30% of the entire land and sea areas, and at least 10% of them under strict protection by 2030. The Updated Zero drafted in August 2020 concisely set out one quantitative goal of at least 30% of the globe by 2030, adding qualitative goals that these areas should be protected and conserved through "well connected and effective system of protected areas and OECMs at least 30 % of the planet with the focus on areas particularly important for biodiversity." Based on the draft Post-2020 GBF's targets related to protected areas and Korea's national targets reflecting the current state of Korea and established national plans, we suggest the national targets "to protect and conserve at least 30% of the land area and 10% of the marine area and to strengthen the means of qualitative achievement by establishing sub-targets through an effective system of protected areas and OECMs by 2030.".

A Study on efficient transmission performance improvement Considering the security in the wireless LAN environment (무선랜 환경에서 보안을 고려한 효율적 전송성능 향상에 관한 연구)

  • Hwang, Seong-Kyu;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.837-846
    • /
    • 2013
  • Recently, new technologies based on wireless LAN is being studied because utilization on smart phone using Wi-Fi is increased. 802.11 b/g/a is universalized wireless LAN technologies based on ISM, the standard developed in 11's working group of IEEE 802. standardization about IEEE 802.11ac that overcame limitation on Blue-ray of IEEE 802.11n or uncompressed video transmission and IEEE 802.af's technologies using TVWS is being actively studied. In this paper, ability of transmission considering the security on AP operated by these technologies have measured and done a comparative analysis with existing wireless LAN environment ability of transmission measured when appling security is more stable than existing ability of transmission in an environment with obstacles and shorten of transmission time is confirmed as a result of analysis.