• Title/Summary/Keyword: Wireless network security

Search Result 896, Processing Time 0.037 seconds

Power control in Ad Hoc network using ZigBee/IEEE802.15.4 Standard (ZigBee/IEEE802.15.4 표준을 사용하는 Ad Hoc 네트워크 상의 전력 통제)

  • Kirubakaran K.;Lee Jae-Kwang
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.219-222
    • /
    • 2006
  • In this paper an intrusion detection system technique of wireless Ad Hoc network is explained and the advantage of making them work in IEEE 802.15.4/ZigBee wireless standard is also discussed. The methodology that is mentioned here is intrusion detection architecture based on a local intrusion database [1]. An ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Due to increased connectivity (especially on the Internet), and the vast spectrum of financial possibilities that are opening up, more and more systems are subject to attack by intruders. An ideal IDS should able to detect an anomaly caused by the intruders quickly so that the misbehaving node/nodes can be identified and appropriate actions (e.g. punish or avoid misbehaving nodes) can be taken so that further damage to the network is minimized

  • PDF

Access Control to Objects and their Description in the Future Network of Information

  • Renault, Eric;Ahmad, Ahmad;Abid, Mohamed
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.359-374
    • /
    • 2010
  • The Future Internet that includes Real World Objects and the Internet of Things together with the more classic web pages will move communications from a nodecentric organization to an information-centric network allowing new a paradigm to take place. The 4WARD project initiated some works on the Future Internet. One of them is the creation of a Network of Information designed to enable more powerful semantic searches. In this paper, we propose a security solution for a model of information based on a semantic description and search of objects. The proposed solution takes into account both the access and the management of both objects and their descriptions.

The Study on Next Generation Network Security Architecture in the BcN Environment (BcN 환경을 고려한 차세대 네트워크 보안 구조에 관한 연구)

  • 오승희;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.709-712
    • /
    • 2004
  • The BcN is applying from public networks to local networks and each terminal step by step under supporting MIC(Ministry of Information and Communication Repoblic of Korea) until 2007. The architecture of network sorority should considers BcN environment and evolves to manage Ipv6 traffics. The next generation network security architecture can manage not only Ipv6 environment but also wire and wireless integrated network. We suggest the next generation network security architecture for Ipv6 environment and wire-wireless integrated network environment and verify the performance of the suggested architecture using network security scenario.

  • PDF

A Study on Attack Detection Technique based on n-hop Node Certification in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 n-hop 노드 인증 기반 공격 탐지 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.3-8
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

Effective Evaluation of Quality of Protection(QoP) in Wireless Network Environments (무선 네트워크 환경에서의 효과적인 Quality of Protection(QoP) 평가)

  • Kim, Hyeon-Seung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.97-106
    • /
    • 2008
  • Quality of Protection(QoP) provides a standard that can evaluate networks offering protection. Also, QoP estimates stability of the system by quantifying intensity of the security. Security should be established based on the circumstance which applied to appropriate level, and this should chose a security policy which fit to propose of network because it is not always proportioned that between stability of security mechanism which is used at network and performance which has to be supported by system. With evolving wireless networks, a variety of security services are defined for providing secure wireless network services. In this paper, we propose a new QoP model which makes up for weak points of existing QoP model to choose an appropriate security policy for wireless network. Proposed new QoP model use objectively organized HVM by Flow-based Abnormal Traffic Detection Algorithm for constructing Utility function and relative weight for constructing Total reward function.

A Study on the security improvement between different mobile terminal Using All-IP in Wireless Network (All-IP망에서 다기종 Mbile단말기 간 보안개선에 관한 연구)

  • Byun, Byung-Kil;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.730-733
    • /
    • 2010
  • Mobile handsets with all applicable Internet Protocol brought communication channels between the easy and rapid development. But this time that the security is part of the most vulnerable points. All IP-network currently being presented to analyze the current state of integration technology, and two kinds of terminal interworking between networks of different security systems are likely to occur in the course of the various security threats, vulnerabilities and expectations regarding possible measures to consider more stringent security technologies and performance analysis the present study.

  • PDF

AP and RADIUS server security and vulnerability analysis. (AP와 RADIUS서버 보안 및 취약점 분석)

  • Kim, Hyun Ho;Jang, WonTae;Jo, Jung Bok;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.241-244
    • /
    • 2013
  • These days wireless network devices (smartphones, tablet PC, laptop) are being utilized more frequently. In line with the increasing number of users of a wireless network, the usage of wireless access points is also increasing. Nowadays as nationwide wireless network services being made available, wireless networks are increasingly being used due to the lower costs of building faster and affordable private or carrier networks. However wireless security is not keeping up with this development. Many use open networks where anyone can join, meanwhile for those using wireless security protocols there is the problem of managing the password. In this paper, we analyze the problems of trying to build a user authentication system using an access point and the RADIUS server.

  • PDF

Resolving Security Issues of Cognitive Radio Networks

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.797-799
    • /
    • 2012
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, as the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because law breakers could abuse the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF

Research of Security Methods based on Mobile Internet (모바일 인터넷 상의 보안 기법 연구)

  • 이원구;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.296-300
    • /
    • 2004
  • In this paper, we discuss about mobile Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now

  • PDF

The Study of Building Security-Established Enterprise Mobile-VPN on WiBro Network (WiBro망에서 보안성이 확립된 기업용 Mobile-VPN 구축 방안 연구)

  • Cho, Do-Hyeoun;Kang, Dae-Seok;Han, Kyu-Jeong;Ji, Yung-Ha;Han, Wan-Ok
    • 전자공학회논문지 IE
    • /
    • v.47 no.4
    • /
    • pp.48-52
    • /
    • 2010
  • Recently, WiBro service as a mobile internet has been being extended. The market of wireless data communication has been being extended rapidly due to the increase of mobile data communication service supply such as smart-phone, WiBro service and so on. As the result, security is also emphasized in the mobile Internet In this paper, we propose the methods that tighten up security in the upcoming Enterprise Mobile-VPN service on WiBro network.