• Title/Summary/Keyword: 무선 AP

Search Result 439, Processing Time 0.066 seconds

A Study of Call Admission Scheme using Power Strength Threshold value between APs in Wireless LAN Environments (무선랜 환경에서 AP간 전력임계치값을 통한 호 처리 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.107-112
    • /
    • 2015
  • A smart phone and the number of wireless terminals are mobile-to the nature of the AP mobility are many call transfer between wireless terminals and AP (Access Point). Each wireless terminal that is the call processing process for each is relatively large to cause the wireless traffic, and a factor that inhibits the efficient use of the radio band on the AP. In this paper, we use the power intensity threshold and threshold timer of the AP received by the mobile station to reduce the amount of switching traffic between the AP's cause and traffic generation factors between the wireless device and the AP that can effectively utilize the radio traffic from the AP the measures proposed. The proposed method and the conventional method is improved by simulation to handle the amount of radio traffic from the AP it was confirmed that it is possible to effectively utilize the whole of the radio band.

Detecting and Isolating a Cloned Access Point IEEE 802.11 (IEEE 802.11에서의 복제된 AP 탐지 및 차단 기법)

  • Go, Yun-Mi;Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.45-51
    • /
    • 2010
  • Appearance of a cloned AP(Access Point) causes MS(Mobile Station) to break an association with a normal AP(Access Point). If signal power of the cloned AP is stronger than that of the normal AP, MS associates with the cloned AP. Therefore, MS is easily exposed to attackers who installed the cloned AP. In this paper, we distinguish cloned AP from normal AP by using the association time and frame sequence number between normal AP and MS, then isolates the cloned AP. The simulation by NS-2 shows that our mechanism isolates efficiently a cloned AP and builds safer wireless LAN environment.

Defense Tactics Against the Attack of Cloned Access Point in IEEE 802.11 Networks (IEEE 802.11 네트워크에서의 복제된 AP 탐지 공격으로 부터의 방어 대책)

  • Go, Yun Mi;Kim, Jin-Hui;Kwon, Kyuug-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.427-428
    • /
    • 2009
  • 무선 네트워크 환경에서 합법적인 AP(Access Point)의 MAC 주소, SSID(Service Set Identifier), 채널등의 정보를 이용하여 복제된 AP(Cloned Access Point)를 만들 수 있다. 복제된 AP는 합법적인 AP와 연결되어 있는 무선 스테이션들의 연결 설정을 끊고 자신과 연결 설정을 하게 한다. 무선 스테이션들이 복제된 AP와 통신을 하게 되면서 많은 공격으로부터 노출되게 된다. 본 연구에서는 복제된 AP가 설치되었을 때 무선 스테이션들이 합법적이 AP의 비콘 프레임과 복제된 AP 비콘 프레임의 시퀀스 번호를 이용하여 복제된 AP을 판별하였다. 시뮬레이터 NS-2를 이용하여 실험한 결과 본 논문에서 제안하는 메커니즘을 통해 무선 스테이션들이 복제된 AP의 등장을 판별할 수 있게 되어 보다 안전한 무선랜 환경을 구축할 수 있게 되었다.

Mobile Malicious AP Detection and Cut-off Mechanism based in Authentication Network (인증 네트워크 상의 비 인가된 모바일 AP 탐지 및 차단 기법)

  • Lim, Jae-Wan;Jang, Jong-Deok;Yoon, Chang-Pyo;Ryu, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.55-61
    • /
    • 2012
  • Owing to the development of wireless infrastructure and mobile communication technology, There is growing interest in smart phone using it. The resulting popularity of smart phone has increased the Mobile Malicious AP-related security threat and the access to the wireless AP(Access Point) using Wi-Fi. mobile AP mechanism is the use of a mobile device with Internet access such as 3G cellular service to serve as an Internet gateway or access point for other devices. Within the enterprise, the use of mobile AP mechanism made corporate information management difficult owing to use wireless system that is impossible to wire packet monitoring. In this thesis, we propose mobile AP mechanism-based mobile malicious AP detection and prevention mechanism in radius authentication server network. Detection approach detects mobile AP mechanism-based mobile malicious AP by sniffing the beacon frame and analyzing the difference between an authorized AP and a mobile AP mechanism-based mobile malicious AP detection.

Energy Efficient Access Point Selection Method for IEEE802.11 Wireless LANs (IEEE802.11 무선망을 위한 에너지 효율적인 AP 선택 기법)

  • Heo, Ung;Peng, Yu-Yang;You, Kang-Soo;Choi, Jae-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.578-585
    • /
    • 2011
  • Nowadays, wireless local area networks are widely deployed so that stations can potentially associate with an access point. The AP selection strategy is one of the significant research areas for wireless local area networks. The selection strategy solves the relevant problem is which AP can be selected and associated with a station so that the efficient resource utilization can be obtained. Rather than merely choosing the AP with the strongest received signal strength, however, we calculate effective throughput for each neighboring AP and use it as a basis for AP selection. Referencing the throughput is better than referencing the signal strength only because the network may contain a severe load imbalance. We have performed computer simulations using OPNET modeler in order to verify the performance of the proposed scheme. The results show us that the proposed selection method outperforms that of the conventional one in terms of throughput and delay.

Study on intruder detection method using a wireless Lan AP (무선랜 AP를 이용한 무선랜 침입자 탐지 방법 연구)

  • 신동훈;김동현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.295-297
    • /
    • 2004
  • 현대 사회는 무선통신 기술의 급속한 발달로 인해 사용자가 자신의 위치에 상관없이 어디서든지 네트워크에 접속하여 서비스를 제공받을 수 있게 되었다. 하지만, 무선은 유선에 비해 상대적으로 보안에 취약하여 정보보호에 특별한 주의가 필요하다. 유선 네트워크는 침투를 위해서 물리적으로 침투위치를 확보해야만 공격을 수행할 수 있었으나, 무선의 경우에는 전파도달 거리내의 아무 곳에서나 공격을 시도할 수 있어 무선랜을 통한 많은 공격시도가 현실화되고 있다. 또한 공격자가 공공장소, 대학교, 카페 등의 개방된 곳에서 자신이 습득한 다른 사용자의 ID를 사용하여 공중 무선랜 서비스에 접속하여 어느 특정 기관을 공격, 해킹 할 경우에 공격 근원지와 공격자에 대한 추적이 사실상 불가능하다. 이러한 무선랜이 갖는 취약성을 보완하고 안전한 무선랜 환경을 구축하기 위해서, 본 논문에서는 무선랜 장비인 AP를 이용하여 침입자를 탐지하는 방법을 제시하고 있다. 제시된 방법은 현재 사용되어지고 있는 무선랜 환경에 추가적인 장비의 도입을 하지 않고, AP의 기능을 이용하는 방법을 제시하고 있다. 향후 AP와 무선 센서를 기반으로 하여 좀 더 정밀하고, 정확하게 침입자를 탐지하는 기술을 보강할 예정이다.

  • PDF

Localization of WLAN Access Point Smart Phone's GPS Information (스마트 폰의 GPS 정보를 이용한 무선랜 접속점 위치 측정 방법)

  • Chun, Seung-Man;Lee, Seung-Mu;Nah, Jae-Wook;Choi, Jun-Hyuk;Park, Jong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1442-1449
    • /
    • 2011
  • In this article, we propose a new method for precise WLAN (Wireless Area Network) AP (Access Point) localization using GPS information measured in the smart phone. The idea is that the possible area of WLAN AP location, called AP_Area, is first determined by measuring GPS information and the received signal strength in the smart phones. As the number of measurements from the smart phones increases, the AP_Area are successively narrowed down to the actual AP location. We have performed the simulation to evaluate the proposed algorithm. The simulation results show that the proposed algorithm can detect the Wi-Fi AP localization within 5 m (probability over than 90%).

A Wireless AP Power Saving Algorithm by Applying Sleep Mode and Transmission Power Coordination in IoT Environments (사물 인터넷 환경에서 무선 AP의 수면 모드 운영 및 송출 전력 조절을 통한 전력 소비 절감 알고리즘)

  • Jeong, Kyeong Chae;Choi, Won Seok;Choi, Seong Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.393-402
    • /
    • 2014
  • We have experienced an explosive increase of the IoT(Internet of Things) technology based devices including smart phones and the wireless communications. Also the growing power consumption in IEEE 802.11 WLANs(Wireless LANs) driven by these dramatic increases in not only mobile users and but also wireless APs(Access Points). To reduce the power consumption, this paper proposes a wireless AP power saving algorithm, which minimizes the transmission power without decrease the transmission and carrier sense ranges. A wireless AP which is use in our algorithm checks its own original coverage periodically for whether there is a new STA(Station) or not when its transmission power is decreased. Moreover, if there are no signaling message to connect the wireless AP, it changes its operation mode Wake-up to sleep. A Result shows that the proposed AP algorithm can reduce the total power consumption of the wireless AP approximated 18% and 35% compared to the conventional wireless AP with and without the existing power saving algorithm, respectively.

Analysis of Radio Wave of Location Estimation of Wireless Access Point (무선 AP 위치 예측을 위한 전파특성 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.6
    • /
    • pp.1653-1658
    • /
    • 2008
  • In this paper, it is analyzed propagation distribution characteristics of radio wave, which is radiated on all sides from Access Point device for estimating scheme of wireless AP without GPS receiver environment. To tracking AP device is traced from wireless terminals and wireless terminal is traced from fixed AP devices, above all it is important to analysis the characteristics of receiving power in according to distance. Therefore in this paper, radio propagation characteristics of 2.4GHz wave is analyzed effect extent and quality in according to distance in doors and out doors, and utilized to location estimation.

A Study of Vulnerability Analysis and Attack using Smart Phone at WiFi Zone (WiFi Zone에서 Smart Phone 사용 시 취약점 분석과 공격에 대한 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.407-409
    • /
    • 2011
  • 최근 Smart Phone에서 WiFi Zone의 활용도가 증가되고 있다. WiFi Zone의 무선 인터넷은 무선이 가지고 있는 취약점을 그대로 가지고 있기 때문에 보안에 대한 취약점이 존재하고 침해사고에 대비한 연구가 필요하다. 본 논문에서는 WiFi Zone에서 암호가 설정된 무선 AP의 패킷을 수집하여 분석하고, 해당 무선 AP의 access 암호를 알아낸다. 암호분석과 WiFi Zone의 취약점을 분석하여 War Driving 기술을 사용하여 무선 인터넷의 취약점을 분석하고, 무선 AP에 대한 공격과 ARP Spoofing 공격을 하여 해당 무선 AP를 마비시키거나 위장 무선 AP를 설정하여 정보를 취득 하였다. 본 논문 연구를 통하여 Smart Phone과 무선 네트워크 보안성을 강화하는 연구 자료로 사용할 것이다.

  • PDF