• Title/Summary/Keyword: Wireless security

Search Result 1,484, Processing Time 0.026 seconds

DoS attack prevention using methods for reduction of memory usage in 802.11i 4-Way Handshake (메모리 사용 감소를 통한 802.11i 4-Way Handshake에서의 DoS 공격 차단 기법)

  • Kim, Jung-Yoon;Kim, In-Hwan;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.89-98
    • /
    • 2010
  • Wireless LAN (WLAN) is type of wireless service that has higher data transmission than current cellular networks. The usage is continually increasing. There are a lot of vulnerabilities in wireless network, due to the properties of the wireless environment, regardless of its popularity. IEEE announced the 802.11i security standard to solve these problems. The vulnerable point of messages used in the process of key distribution for 802.11i makes the target node attacked lose memory through continuous messages and blocks the legitimate WLAN service. In this paper, we proposed new schemes to solve this problem and compared our proposals with the current process. The proposed protocol eliminates the memory exhaustion problem on the client side by using methods for reduction of memory usage.

AP and RADIUS server security and vulnerability analysis. (AP와 RADIUS서버 보안 및 취약점 분석)

  • Kim, Hyun Ho;Jang, WonTae;Jo, Jung Bok;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.241-244
    • /
    • 2013
  • These days wireless network devices (smartphones, tablet PC, laptop) are being utilized more frequently. In line with the increasing number of users of a wireless network, the usage of wireless access points is also increasing. Nowadays as nationwide wireless network services being made available, wireless networks are increasingly being used due to the lower costs of building faster and affordable private or carrier networks. However wireless security is not keeping up with this development. Many use open networks where anyone can join, meanwhile for those using wireless security protocols there is the problem of managing the password. In this paper, we analyze the problems of trying to build a user authentication system using an access point and the RADIUS server.

  • PDF

Intrusion detection agents on the wireless network design (무선네트워크 상에서의 침입탐지 에이전트 설계)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.59-70
    • /
    • 2013
  • Along with the rapid development of the wireless network (Wireless Network) technology for secure wireless communications, security problems have emerged as an important issue. In order to operate the wireless network intrusion detection system detects the agent installed on each wireless node should be. Ad-hoc network structures scattered in the AP over a wireless network without the node is a structure that makes it possible to communicate to connect. Intrusion detection agent to be installed on the node, and the corresponding energy consumption occurs when the survival time is reduced. On a node that can monitor a lot of traffic in order to increase the effect of intrusion detection, an intrusion detection agent should be placed. Therefore, in this paper, by taking advantage of the structure of Ad-hoc wireless network, considering the maximum living time of the network, while at the same time, the effectiveness of intrusion detection and intrusion detection by proposing a plan for installing the agent. Also improve the system performance by reducing the network load on each network, a system designed for data aggregation to reduce data redundancy, network energy consumption by reducing.

The Risk of Wardriving Attack Against Wireless LAN and its Counterplan (무선랜 워드라이빙 공격의 위험성과 대응방안)

  • Choi, Young-Nam;Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2121-2128
    • /
    • 2009
  • The application range of IEEE 802.11 wireless LAN has rapidly expanding from campus, enterprise to the public network of Hot Spot area due to the advantages of easiness of construction, mobility of wireless client station, convenience of usage and so on. However the security of WLAN(Wireless LAN) is vulnerable inherently because of using RF as a medium, and so the dangers of infringement of personal information and inside data of enterprises have increased and wardriving attack searching for security vulnerability in wireless LAN has become more serious especially. In this paper, we find out the overview of various procedures and preparatory stages for wardriving attack against wireless LAN, and propose complementary methods to prevent information infringement accidents from wardriving attack in wireless LAN. For this purpose, we make an equipment which is suitable for wardriving in wireless LAN and show security vulnerability of AP(Access Point) operation in WLAN around Yangjae-Dong in Seoul as a result of using the equipment.

New Key Control Metod for Wireless Lan Security (무선랜 보안을 위한 새로운 키 관리 방식)

  • Lee, Hang-Seok;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.708-711
    • /
    • 2008
  • Wireless Lan is rapidly increased, but now most of wireless lan are being used to cover physical boundary of wired tan. If Users who communicate each other send cipher data, other users can not change or interrupt and the data is guaranteed for integrity. Otherwise, if user lose key for any reason, the data is not guaranteed for integrity. So it is important to control and manage to offer key. This Thesis examine problems of using existing wireless lan. Moreover, for users using small wireless lan, this offers installing server for controling and sharing and improves security problems.

  • PDF

Design of Wired and Wireless linkage Hybrid Sensor Network Model over CATV network (CATV망을 이용한 유무선 연동의 하이브리드 센서 네트워크 모델 설계)

  • Lee, Kyung-Sook;Kim, Hyun-Deok
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.67-73
    • /
    • 2012
  • In this paper, in order to overcome the disadvantage of wireless-based sensor network, a hybrid sensor network using wired and wireless linkage is proposed. Proposed a wired and wireless linkage hybrid sensor network can compensate the defect of poor transmission at the indoor wireless environment, and can be free from interference between a wireless LAN and Bluetooth of the same frequency bandwidth due to an attribute of low-loss transmission at the CATV network. Also, proposed a wired and wireless linkage hybrid sensor network make use of CATV network which is well-built infrastructure, is more efficient to design network, assure a stability and high reliability of the sensor network as providing a stability for an inaccuracy and a predictable transmission link for the existing wireless network.

A Study on efficient transmission performance improvement Considering the security in the wireless LAN environment (무선랜 환경에서 보안을 고려한 효율적 전송성능 향상에 관한 연구)

  • Hwang, Seong-Kyu;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.837-846
    • /
    • 2013
  • Recently, new technologies based on wireless LAN is being studied because utilization on smart phone using Wi-Fi is increased. 802.11 b/g/a is universalized wireless LAN technologies based on ISM, the standard developed in 11's working group of IEEE 802. standardization about IEEE 802.11ac that overcame limitation on Blue-ray of IEEE 802.11n or uncompressed video transmission and IEEE 802.af's technologies using TVWS is being actively studied. In this paper, ability of transmission considering the security on AP operated by these technologies have measured and done a comparative analysis with existing wireless LAN environment ability of transmission measured when appling security is more stable than existing ability of transmission in an environment with obstacles and shorten of transmission time is confirmed as a result of analysis.

A Secure Multipath Transmission Scheme Based on One-Way Hash Functions in Wireless Sensor Networks (무선 센서 네트워크 환경에서 단-방향 해쉬 함수 기반 다중 경로 보안 전송 기법)

  • Lee, Yun-Jeong;Kim, Dong-Joo;Park, Jun-Ho;Seong, Dong-Ook;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.1
    • /
    • pp.48-58
    • /
    • 2012
  • With the development of sensing devices and wireless communication technologies, wireless sensor networks are composed of a large number of sensor nodes that are equipped with limited computing performance and restricted communication capabilities. Besides, the sensor nodes are deployed in hostile or unattended environments. Therefore, the wireless sensor networks are vulnerable to security. In particular, the fatal damage may be occurred when data are exposed in real world applications. Therefore, it is important for design requirements to be made so that wireless sensor networks provide the strong security. However, because the conventional security schemes in wired networks did not consider the limited performance of the sensor node, they are so hard to be applied to wireless sensor networks. In this paper, we propose a secure multipath transmission scheme based on one-way hash functions in wireless sensor networks considering the limited performance of the wireless sensor nodes. The proposed scheme converts a sensor reading based on one of one-way hash functions MD5 in order to make it harder to be cracked and snooped. And then, our scheme splits the converted data and transfers the split data to the base station using multi-path routing. The experimental results show that our proposed scheme consumes the energy of just about 6% over the existing security scheme.

Grid-Based Key Pre-Distribution in Wireless Sensor Networks

  • Mohaisen, Abedelaziz;Nyang, Dae-Hun;Maeng, Young-Jae;Lee, Kyung-Hee;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.195-208
    • /
    • 2009
  • In this paper, we introduce a grid-based key pre-distribution scheme in wireless sensor networks, which aims to improve the connectivity and resiliency while maintaining a reasonable overhead. We consider simplification of the key establishment logic and enhancement of the connectivity via plat polynomial assignment on a three-dimensional grid for node allocation and keying material assignment. We demonstrate that our scheme results in improvements via a detailed discussion on the connectivity, resource usage, security features and resiliency. A comparison with other relevant works from the literature along with a demonstrated implementation on typical sensor nodes shows the feasibility of the introduced scheme and its applicability for large networks.

A Study on the security improvement between different mobile terminal Using All-IP in Wireless Network (All-IP망에서 다기종 Mbile단말기 간 보안개선에 관한 연구)

  • Byun, Byung-Kil;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.730-733
    • /
    • 2010
  • Mobile handsets with all applicable Internet Protocol brought communication channels between the easy and rapid development. But this time that the security is part of the most vulnerable points. All IP-network currently being presented to analyze the current state of integration technology, and two kinds of terminal interworking between networks of different security systems are likely to occur in the course of the various security threats, vulnerabilities and expectations regarding possible measures to consider more stringent security technologies and performance analysis the present study.

  • PDF