• Title/Summary/Keyword: Wireless LAN Security

Search Result 139, Processing Time 0.027 seconds

A study on the security system for wireless LAN (무선 LAN을 위한 보호시스템에 관한 연구)

  • 박영호;김철수
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.3
    • /
    • pp.107-115
    • /
    • 2002
  • The rapid progress of wireless LAN technology has prompted new security problems and countermeasures against them. Since the mobility of users and wireless access to the network exasperate potential security threat such as eavesdropping and illegal access, security services for wireless LAN should be provided. In this paper, we define the security model, WEP and AES encrypt/decrypt technologies which are proposed in the IEEE802.11 standard and the IEEE802.11eS draft and propose the Key distribution protocol for the wireless LAN.

  • PDF

Disconnection of Wireless LAN Attack and Countermeasure (무선 LAN 연결 해제 공격과 보안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.453-458
    • /
    • 2013
  • In a wireless LAN environment, security is the most important. Security of 802.11 standard has many vulnerabilities of the network attack. IEEE has created mechanisms to security for this vulnerability. But the vulnerabilities is characteristic of broadcast in the air in wireless LAN, it is more disclosure then other network environments. In a wireless LAN environment, it can be accessed to the wireless LAN after authentication. Authentication process is one of most important because of the first security step. However, in the authentication process is not mentioned in the method of reducing the disclosure maximum fundamental. Therefore, in this research, the vulnerability of 802.11 are presented and how to do de-authentication in 802.11.

Fast and Safe Roaming in Wireless LAN By Forwarding Data Frames between APs (AP 사이의 데이터 중계를 통한 신속하고 안전한 무선랜 로밍 방법)

  • Oh, Kyunghee;Kang, Yousung;Chung, Byungho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1185-1188
    • /
    • 2004
  • 기존의 IEEE 802.11 표준에 따르는 무선랜에서 보안에 취약한 점들이 발견된 후, 이를 보완하기 위한 802.11i 규격이 작성되고 있다. 이에 따르면, STA가 로밍하는 과정에서 new AP와 reassociation 이후 AP로부터 인증을 받는 과정을 추가로 거쳐야 한다. 이는 로밍 과정에서 발생하는 지연을 늘리고, 따라서 데이터 프레임들의 손실을 가져온다. 그런데, new AP와 STA 사이의 보안협상이 완료될 때까지, old AP에서 손실될 데이터 프레임을 old AP의 보안 정보를 적용하여 new AP를 통해서 STA로 전달함으로써 이러한 데이터 손실을 막을 수 있다.

  • PDF

The Risk of Wardriving Attack Against Wireless LAN and its Counterplan (무선랜 워드라이빙 공격의 위험성과 대응방안)

  • Choi, Young-Nam;Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2121-2128
    • /
    • 2009
  • The application range of IEEE 802.11 wireless LAN has rapidly expanding from campus, enterprise to the public network of Hot Spot area due to the advantages of easiness of construction, mobility of wireless client station, convenience of usage and so on. However the security of WLAN(Wireless LAN) is vulnerable inherently because of using RF as a medium, and so the dangers of infringement of personal information and inside data of enterprises have increased and wardriving attack searching for security vulnerability in wireless LAN has become more serious especially. In this paper, we find out the overview of various procedures and preparatory stages for wardriving attack against wireless LAN, and propose complementary methods to prevent information infringement accidents from wardriving attack in wireless LAN. For this purpose, we make an equipment which is suitable for wardriving in wireless LAN and show security vulnerability of AP(Access Point) operation in WLAN around Yangjae-Dong in Seoul as a result of using the equipment.

A Study on Intrusion Detection of ARP Poisoning Attack on Wireless LAN

  • Ham Young Hwan;Lee Sok Joon;Chung Byung Ho;Chung Kyoll;Chung Jin Wook
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.540-543
    • /
    • 2004
  • Address Resolution Protocol (ARP) cache poisoning is a MAC layer attack that can only be carried out when an attacker is connected to the same local network as the target machines. ARP is not a new problem, but wireless network introduces a new attack point and more vulnerable to the attack. The attack on wireless network cannot be detected by current detection tool installed on wired network. In order to detect the ARP poisoning attack, there must be a ARP poisoning detection tool for wireless LAN environment. This paper proposes linux-based ARP poisoning detection system equipped with wireless LAN card and Host AP device driver

  • PDF

A Safe and Reliable Method for Installing Wireless LAN into a Hospital

  • Hanada, Eisuke;Kudou, Takato
    • Journal of electromagnetic engineering and science
    • /
    • v.11 no.4
    • /
    • pp.269-273
    • /
    • 2011
  • A medical environment in which patient information can be accessed anytime / anywhere is called a "ubiquitous environment". To realize such an environment, the installation of wireless LAN is quite effective. Because the maximum radio wave output (antenna power) is set low in Japan, it has been easy to safely introduce wireless LAN into hospitals, to date mainly into large hospitals. However, if the placement of access points is not done properly, problems will occur, such as signals not reaching the desired area. A solution to these types of problems is to do an electromagnetic-field propagation simulation, which should be performed before construction of the hospital. It is also necessary to protect against security problems, such as signal interception or illegal access. We herein show our procedures for the safe introduction of wireless LAN.

Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN (무선 랜 환경 인증 메커니즘의 취약성 분석 및 대응방안 연구)

  • Choi, Jin-Ho;Oh, Soohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1219-1230
    • /
    • 2012
  • Recently, lots of users are using wireless LAN providing authentication and confidentiality with security mechanism such as WEP, WPA. But, weakness of each security mechanism was discovered and attack methods that user's information was exposed or modified to the third parties with it and abused by them were suggested. In this paper, we analyzed architecture of security mechanisms in wireless LAN and performed PSK cracking attack and cookie session hijacking attack with the known vulnerability. And, an improved 4-way handshake mechanism which can counter PSK cracking attack and a cookie replay detection mechanism which can prevent cookie session hijacking attack were proposed. Proposed mechanisms are expected to apply to establish more secure wireless LAN environment by countering existing vulnerability.

A Study on Dynamic Key Management in Mixed-Mode Wireless LAN (혼합모드 무선랜에서의 동적 키 관리 방식 연구)

  • 강유성;오경희;정병호;정교일;양대헌
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.581-593
    • /
    • 2004
  • The interest in wireless LAN security is on the increase owing to a role of high-speed wireless Internet infrastructure of wireless LAN. Wi-Fi has released WPA standard in order to overcome drawbacks of WEP algorithm that is security element of current IEEE 802.11-based wireless LAN system. Pairwise key management and group key management in a mixed-mode which supports both terminals running WPA and terminals running original WEP security are very complicate. In this paper, we analyze flaws in WPA authenticator key management state machine for key distribution and propose the countermeasures to overcome the analyzed problems. Additionally, WPA authenticator key management state machine to which the solutions are applied is described. The reconstructed WPA authenticator key management state machine helps the AP perform efficiently group key exchange and group key update in the mixed-mode.

New Key Control Metod for Wireless Lan Security (무선랜 보안을 위한 새로운 키 관리 방식)

  • Lee, Hang-Seok;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.708-711
    • /
    • 2008
  • Wireless Lan is rapidly increased, but now most of wireless lan are being used to cover physical boundary of wired tan. If Users who communicate each other send cipher data, other users can not change or interrupt and the data is guaranteed for integrity. Otherwise, if user lose key for any reason, the data is not guaranteed for integrity. So it is important to control and manage to offer key. This Thesis examine problems of using existing wireless lan. Moreover, for users using small wireless lan, this offers installing server for controling and sharing and improves security problems.

  • PDF