• Title/Summary/Keyword: Wireless security

Search Result 1,484, Processing Time 0.029 seconds

Revisiting Path-Key Establishment of Random Key Predistribution for Wireless Sensor Networks (무선센서네트워크를 위한 랜덤키사전분배기법의 경로키 설정에 대한 재고)

  • Kwon, Tae-Kyoung;Lee, Jong-Hyup;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.165-169
    • /
    • 2009
  • In this short paper, we revisit the random key predistribution methods for wireless sensor networks with regard to their intrinsic phase called the path-key establishment. First we show that the path-key establishment is less practical than expected and may degrade the performance of key establishment significantly. We then propose a novel path-key establishment method for those schemes and analyze its advantageous performance improvement.

Effective Evaluation of Quality of Protection(QoP) in Wireless Network Environments (무선 네트워크 환경에서의 효과적인 Quality of Protection(QoP) 평가)

  • Kim, Hyeon-Seung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.97-106
    • /
    • 2008
  • Quality of Protection(QoP) provides a standard that can evaluate networks offering protection. Also, QoP estimates stability of the system by quantifying intensity of the security. Security should be established based on the circumstance which applied to appropriate level, and this should chose a security policy which fit to propose of network because it is not always proportioned that between stability of security mechanism which is used at network and performance which has to be supported by system. With evolving wireless networks, a variety of security services are defined for providing secure wireless network services. In this paper, we propose a new QoP model which makes up for weak points of existing QoP model to choose an appropriate security policy for wireless network. Proposed new QoP model use objectively organized HVM by Flow-based Abnormal Traffic Detection Algorithm for constructing Utility function and relative weight for constructing Total reward function.

A WTLSW Protocol and a Proxy Model to Ensure End-to-End Security for Mobile Devices with Limited Resources (제한된 자원의 무선 단말기를 위한 종단간 보안을 제공하는 WTLSW 프로토콜 및 프록시 모델)

  • Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.29 no.B
    • /
    • pp.33-39
    • /
    • 2009
  • The need for end-to-end security has been increased with the widespread use of mobile devices in wireless internet access applications such as mobile commerce. The WAP1.x has an end-to-end security problem that the message transmitted between the mobile device and the Web server is decrypted inside the gateway within a short time. To overcome this problem, several protocols including WAP2.0 has been proposed. These protocols require that the heavy modules such as TLS or data compression modules should be installed on the mobile device with limited resources. This paper proposes a new WTLSW(WTLS-TLS at Web server) protocol and a new WAP2.0 proxy model in order to ensure end-to-end security between the mobile device and the Web server and to be appropriate for mobile devices with limited resources.

  • PDF

USN Security Considerations in Home Network (홈 네트워크에서의 USN 보안 고려 사항 분석)

  • Park, Woo-Chool;Park, Hyun-Mun;Lee, Myung-Soo;Yoon, Nyung-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.171-173
    • /
    • 2006
  • Because sensor networks use wireless communication, they are vulnerable to attacks which are more difficult launch in the wired domain. Many wired networks benefit from their inherent physical security properties. It is unlikely that an adversary will dig up the Internet backbone and splice into the line. However, wireless communications are difficult to protect; they are by nature a broadcast medium. In a broadcast medium, adversaries can easily eavesdrop on, intercept, inject, and alter transmitted data. In addition, adversaries are not restricted to using sensor network hardware. We have analyzed the IEEE 802.15.4, ZigBee specification which includes a number of security provisions and options. In this paper, we highlight places where USN security considerations and home network attack scenarios.

  • PDF

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

A SUDY on the Design and Implementation of Wireless VPN in CDMA 3C Surroundings (CDMA 3G 환경에서 Wireless VPN의 설계/구현 방안에 관한 연구)

  • 김정태;이종필;신승중;류대현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.721-724
    • /
    • 2003
  • 본 논문에서는 CDMA 3G 환경에서의 Wireless VPN에 있어서의 문제점을 분석하고 설계/구현 방안을 제시하고자 한다. Wireless VPN의 최종 목표는 Wireline VPN과의 통합을 이루어서 진정한 Mobile VPN을 구현하는 것이지만 아직까지 Mobile IP 지원에 대한 국제 표준이 완전히 정비되지 않은 상태이고 또한 Mobile VPN에 대한 기술적 검증이 이루어진 적이 없기 때문에 본 논문에서는 Wireless VPN에 초점을 맞추도록 한다.

  • PDF

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

New concept of Wireless LAN service for Wireless home network (무선 홈 네트워크 구축을 위한 신개념 무선랜 서비스)

  • Kim, Wan-Ki;Ki, Ho-Young;Lee, Hang-Su;Woo, Jong-Myoung;Hong, Sung-Yong
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2005.11a
    • /
    • pp.385-390
    • /
    • 2005
  • In this paper, we studied a new concept of wireless LAN service. Current service for wireless LAN has some weak points such as occuring a frequency shadowed area, high cost for setting a number of APs, electromagnetic interference by means of a large output transmission and weak security issues. To reduce those problems, we proposed setting antennas which are from one AP for each rooms, and designed a suitable antenna. After that we measured a PMA(Propagation Measurement & Analysis). Experimental results showed that a new concept of wireless LAN service is excellent to resolve interference and weak security issues by minimizing external propagation of a building.

  • PDF

A Study on Appropriate S-box of DES in Radio Channel (무선채널에 적합한 DES의 S박스에 관한 연구)

  • Park, Mi-Og;Choi, Yeon-Hee;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1C
    • /
    • pp.18-24
    • /
    • 2004
  • Nowadays, the development of wireless communications provides a convenience for many people. On the other hand, the openness of wireless communications poses serious security threats and the security of wireless communications is necessary to support the secure communication channel. The common security method on wireless is the stream cipher that generates the pseudorandom number. In this paper, we propose the usage of the nonlinear function S-box and the mechanism according to it in stream cipher as the study to securely protect data transferred on wireless communications. Besides, it goes abreast a study on S-box with the best random characteristic among the used S-boxes on wireless communications. By means of test, we investigate the most appropriate S-box of DES on wireless communications environment and prove the efficiency of the proposed model by comparing and analysis of the randomness of the based stream cipher and the proposed model.