• Title/Summary/Keyword: Wireless LAN Security

Search Result 139, Processing Time 0.025 seconds

A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment (무선랜 환경에서 양자 엔트로피 칩 기반 암호모듈을 적용한 드론 피아식별과 안전한 정보 제공 기술 제안)

  • Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.891-898
    • /
    • 2022
  • Along with global interest, drones are expanding the base of utilization such as transportation of goods, forest protection, and safety management, and cluster flights are being applied in various fields such as military operations and environmental monitoring. Currently, specialized networks such as e-UM 5G for services in specific industries are being established in Korea. In this regard, drone systems are also moving to establish specialized networks to provide services that are fused with AI and autonomous flight. As drones converge with various services, various security threats in various environments are also subordinated, and in response, requirements and guidelines for drone security are being prepared in Korea. In this paper, we propose a technology method for peer identification and safe information provision between cluster flight drones by utilizing a cryptographic module equipped with wireless LAN and quantum entropy-based random number generator in a cluster flight system and a mobile communication network such as e-UM 5G.

An Authentication Protocol for Fast Soft Handover in Portable Internet (휴대인터넷에서 고속 소프트 핸드오버를 위한 인증 프로토콜)

  • Ryu, Dae-Hyun;Choi, Tae-Wan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.10
    • /
    • pp.1786-1795
    • /
    • 2006
  • Portable Internet extended from wireless LAN has a large cell size, similar to a wireless mobile communication. and can provide the seamless service which offers middle-low speed mobility. IEEE 802.16e, the international standard of Portable Internet, uses PKMv2 protocol for authorization and key exchange between a MSS and a BS. This paper proposes a new protocol based on PKMv2, which can provide that MSS is able to do fast authorization with a new BS when soft handover is occurred in a MSS. Our protocol can carry out fast authorization because of reducing the number of messages and parameter exchange, public key encryption and signature in wireless network more than the previous works. It also prevents eavesdropping from an external attacker and keeps the security against impersonation attacks for both a MSS and a BS.

Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP (비인증 AP의 하드웨어 성능에 따른 시간 측정 기반의 비인증 AP 탐색 기법의 분석)

  • Jang, Rhong-Ho;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.551-558
    • /
    • 2015
  • As more people use Wi-Fi and hotspot, unauthorized APs become one of big security problems in modern society. From the beginning of 2010, researchers study about unauthorized AP continually and contributed a lot of methods of detecting unauthorized AP that use wireless resources. Many researches about unauthorized AP detection use time-delay measurement (e.g., average or standard deviation) which is caused by additional wireless connection. In the most previous researches, however, the unauthorized APs consist of laptop and pulg-in Wi-Fi adaptor, and researchers did not concern about time-delay caused by software network sharing. In this paper, we show that existing unauthorized AP detection scheme that can not efficiently classify the high performance unauthorized AP.

A Study on Intensified scheme to WLAN Secure based on IEEE 802.1x Framework (IEEE 802.1x 프레임워크 기반에서의 무선랜 보안 강화 방안에 관한 연구)

  • Lee Joon;Hong Seong-pyo;Shin Myeong-sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.136-141
    • /
    • 2006
  • The IEEE 802.1x can be using various user authentication mechanisms: One-Time Password, Certificate-Based TLS, Challenge/Response and Keberos through EAP(Extended Authentication Protocol). But, IEEE 802.1x also has vulnerabilities about the DoS, the session hijacking and the Man in the Middle attack due to the absence of AP authentication. In this paper, we propose a WLAN secure system which can offer a safety secure communication and a user authentications by intensified the vulnerability of spoofing and DoS attacks. The suppose system offers a safe secure communication because it offers sending message of integrity service and also it prevents DoS attack at authentication initial phase.

Fast and Secure 2-Way Handshake Mechanism using Sequence Number in Wireless LAN (순번을 이용한 고속의 안전한 무선 랜 2-Way 핸드쉐이크 기법)

  • Lim, Jeong-Mi
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1323-1332
    • /
    • 2009
  • In this paper, we analyze security weakness of 4-Way Handshake in IEEE 802.11i and propose fast and secure 2-Way Handshake mechanism. Compute PTK(Pairwise Transient Key) using sequence number instead of random numbers in order to protect Replay attack and DoS attack. Also, proposed 2-Way Handshake mechanism can mutual authenticate between mobile station and access point and derive PTK using modified Re-association Request and Re-association Response frames. And, compare with others which are fast and secure Handoff mechanisms.

  • PDF

Survey and Analysis of Mobile B2B Demand (모바일 B2B 수요에 대한 조사 분석 연구)

  • Kim, Chul-Whan
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.2
    • /
    • pp.1-19
    • /
    • 2005
  • Due to the phenomenal growth in mobile internet users, mobile business as a type of applications of mobile internet has attracted the related industries' and academic researchers' attentions. However, most researchers focus on the issues of Mobile B2C collecting survey questions from consumers or internet users. This paper points out that Mobile B2B has distinct service sector and analyzes the current trend and demand of Mobile B2B in Korea by collecting survey questionnaire from specialists in mobile industries and people in universities and research institutes. Survey fields include business, market, contents/application, research and development and legal system. According to the survey results, Mobile B2B business will rise in distribution, finance, sales, and logistics industries from the beginning of 2005 using wireless PDA and the important preconditions will be security, certification, and standardization.

  • PDF

Global Wireless LAN Roaming Status in Korea and Its Development Methods (국내 글로벌 무선랜 로밍 구축 현황 및 발전 방안)

  • Wang, Gicheol;Cho, Jinoh;Cho, Gihwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.15-21
    • /
    • 2015
  • Due to the appearance of various mobile terminals like smartphone, smartpad, and smartwatch and tremendous development of WiFi technology, data utilization rate on WiFi network is significantly increasing. As a result, users are wanting to use WiFi network using only a simple identification at a visited place as if they are at their home institute. In this paper, we review the domestic status of eduroam service which supports global extension of wireless network access environment and present the future development perspective of the service in Korea. Besides, we shed light on the current status of WiFi sharing service between domestic universities and propose some methods to facilitate the join of domestic universities in eduroam service.

Analysis on Importance of Information Security Factors for Smart Work using AHP -Based on the Mobile Office for Small Businesses- (AHP를 활용한 스마트워크 정보보호 요소의 중요도 분석 -중소기업의 모바일 오피스를 중심으로-)

  • Kang, Kyung-Hoon;Lim, Chae-Hong;Lim, Jong-In;Park, Tae-Hyoung
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.415-426
    • /
    • 2013
  • Smart work has recently introduced as a way to solve problems such as greenhouse gas emissions, low birth rate and aging as well as to improve productivity. Because of development of ICT infrastructure and the proliferation of smart devices, the mobile office has the most commonly used within types of smart work in Korea. But the adoption of the mobile office in small businesses is only half of that of large corporations. The security issue appears to be one of the biggest obstacles to the introduction of smart work in small businesses. Therefore, the purpose of this study is to analyze the information security factors that should be considered when the mobile office is introduced to small businesses. By analyzing the previous studies, the information security factors of the mobile office are classified 5 groups composed of 24 factors. 5 groups are terminals, applications and platforms, networks, servers and users. According to the survey result using AHP, 'User' was drawn to the most important group, and 'Data Encryption', 'Wireless LAN Control' and 'Terminal Recovery When Leaving' were drawn to the important information security factors of the mobile office among 24 factors.

An Approach to a Quantitative Evaluation of U-Service Survivability Reflecting Cyber-terrorism (사이버테러를 고려한 U-Service 생존성의 정량적 평가 방안)

  • Kim, Sung-Ki
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.67-72
    • /
    • 2011
  • A system that provides a ubiquitous service is a networked system that has to overcome their circumstances that the service survivability is weak. the survivability of a networked system is defined as an ability of the system that can offer their services without interruption, regardless of whether components comprising the system are under failures, crashes, or physical attacks. This paper presents an approach that end users can obtain a quantitative evaluation of U-service survivability to reflect intended cyber attacks causing the networked system to fall into byzantine failures in addition to the definition of the survivability. In this paper, a Jini system based on wireless local area networks is used as an example for quantitative evaluation of U-service survivability. This paper also presents an continuous time markov chain (CTMC) Model for evaluation of survivability of U-service that a Jini system provides, and an approach to evaluate the survivability of the U-service as a blocking probability that end users can not access U-services.

Development of vision-based security and service robot (영상 기반의 보안 및 서비스 로봇 개발)

  • Kim Jung-Nyun;Park Sang-Sung;Jang Dong-Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.4
    • /
    • pp.308-316
    • /
    • 2004
  • As we know that there are so many restrictions controlling the autonomous robot to turn and move in an indoor space. In this research, Ive adopted the concept ‘Omni-directional wheel’ as a driving equipment, which makes it possible for the robot to move in horizontal and diagonal directions. Most of all, we eliminated the slip error problem, which can occur when the system generates power by means of slip. In order to solve this problem, we developed a ‘slip error correction algorithm’. Following this program, whenever the robot moves in any directions, it defines its course by comparing pre-programmed direction and the current moving way, which can be decided by extracted image of floor line. Additionally, this robot also provides the limited security and service function. It detects the motion of vehicle, transmits pictures to multiple users and can be moved by simple order's. In this paper, we tried to propose a practical model which can be used in an office.

  • PDF