• Title/Summary/Keyword: AP (Access Point)

Search Result 351, Processing Time 0.023 seconds

An Optimal AP Discovery Method in 802.11 Network (802.11망에서 최적의 AP 검색 기법)

  • Lee, Daewon
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.5
    • /
    • pp.55-62
    • /
    • 2012
  • With the development of mobile communications and Internet technology, there is a strong need to provide seamless and fast connectivity for roaming devices. Generally, the mobile host (MH) may have several available networks when entering a new wireless area. However, the standard of decision for user's internet connection is provided only the subsystem identification (SSID) and signal strength of access point (AP). These two standards could not enough to decide optimal AP to the MH. Therefore, to decide the optimal AP, more information is needed. In this paper, we present additional information such as status of MH, capacity, current load, and depth of network hierarchy, by router advertisement message at layer 3. Also, we proposed decision engine (DE) on the MH that analyzes APs and decides the optimal AP automatically by AP's status information. For the MH, wireless connection period is increased, the power consumption is decreased, and the signaling overhead is reduced. For AP and router, the load balancing is provided and the network topology can also be more efficient.

  • PDF

Design of WiFi-AP Doppler Detection based Wireless Security Services (WiFi-AP 도플러 검파 기반의 무선 보안서비스 설계)

  • Kang, Min-Goo
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.16-19
    • /
    • 2014
  • In this paper, the beacon signals of WiFi doppler frequency detection based WiFi-AP was designed with the subcarrier between a transmitter and a receiver of WLAN(wireless LAN). We can use such signals to identify human moving as an antenna array and tracking of RF beam. This wireless security services with the combination of WiFi doppler frequency and adaptive beacon time signal was proposed for wireless detection and motion based services.

Improvement of Message Security between APs during STA Movement in Wireless Environment (무선LAN 환경에서 단말 이동시 AP간 메시지 보안 개선 방안)

  • 송일규;홍충선;이대영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.325-327
    • /
    • 2003
  • 현재, IEEE 802.11 WG(Working Group)중에는 AP(Access Point)간의 표준화된 프로토콜을 개발하는 TGf(Task Group F)가 있다. 이 그룹에서는 서로 다른 제조업체에서 생산한 AP 간의 상호연동을 보장하기 위한 IAPP(Inter Access Point Protocol)를 제안하였는데. 이는 동일 서브네트워크 내의 서로 다른 AP 간에 이동성을 보장하기 위한 프로토콜로. STA(Station)들이 이동할 때 재인증 과정을 거치지 않고 AP 간의 Security Context 정보나 Layer 2 forwarding 정보를 공유함으로서 STA간의 seamless connectivity를 제공한다. 본 논문에서는 위의 AP간의 메시지 전달시 발생할 수 있는 키 유출을 막기 위해서 메시지의 전달 경로를 바꾸고. 좀 더 높은 보안성을 제공하기 위해 공개키를 이용한 방안을 제시하고자 한다.

  • PDF

Improvement of Handoff Performance Using Prefetched AP Information in IEEE 802.11 (IEEE 802.11 환경에서 사전 AP 정보를 이용한 핸드오프 성능 개선)

  • Lee, Han-Na;Kim, Hyang-Mi;Kim, Sangkyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2401-2409
    • /
    • 2015
  • This paper proposes the improved handoff mechanism for IEEE 802.11 wireless LANs. When a wireless mobile node moves out of the coverage of its currently associated AP(Access Point) and needs to be re-associated with a new AP, a handoff procedure is initiated. Channel scanning process during a handoff procedure occupies over 90% of total handoff latency. Long latency leads to many packet losses and service discontinuity, which degrades wireless network performance. This paper describes about the new mechanism to improve handoff performance by skipping channel scanning during a handoff procedure. In oerder for that, acquires neighboring AP information such as its address, location, channel number in use, the number of associated nodes before handoff, and delivers the information to its associated mobile nodes. The mobile nodes can reduce handoff latency and perform more exact handoff using the delivered AP information. We have conducted simulations to analyze our proposal's performance and confirmed that handoff latency and the number of handoff occurrences are decreased.

Secure Host Mobility in the Mobile IPv6 Network (MIPv6망에서 안전한 호스트 이동성 지원 방안)

  • Kim, Jung-Ju;Hong, Sug-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.82-85
    • /
    • 2005
  • In the MIPv6 network, when mobile nodes move into new newtwork, they need to find the new access router and points(AR/AP) for the newtwork. Unless they are not connected to authorized AR/APs, they can be exposed to a lot of attacks. In this paper we propose a protocol to authenticate AR/AR and MN each other. This protocol is based on the public key scheme which is used in the SEcure Neighbor Discovery(SEND) protocol.

  • PDF

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.

Movement Prediction for Improving Fast Handover in WLAN (WLAN에서 핸드오버 향상을 위한 이동 예측)

  • 김우완;장은진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.109-111
    • /
    • 2004
  • 본 논문은 IEEE 802.11 네트워크 환경에서 MN(Mobile Node)이 핸드오버를 수행하기 전에 미리 이동 정보를 예측함으로써, 유연하게(Seamless) 서비스를 계속 받을 수 있는 예측 방법을 제안한다. 특히, MN이 속한 AP(Access Point)가 중첩된 상황에서 발생할 수 있는 여러 가지 문제점을 해결한다. MN은 이동성 패턴 레코드를 저장하고, 또한 각 이웃 AR(Access Router)은 AP의 AP-ID(BSSID, Basic Service Set ID)와 채널을 저장한다. MN이 AP의 영역의 경계를 벗어나기 전, 새로운 AP로부터 AP-lD를 획득하면, MN이 저장하는 이동성 패턴 레코드에서, AP-ID와 맞는 정보를 비교하여 확률이 높은 AP를 선택한다. 이러한 정보를 PAR(Previous Access Router)에게 정보를 보내어 신속하게 새로운 링크에서 서비스를 받을 수 있음으로써 손실.지연을 최소화 할 수 있다.

  • PDF

RRM Optimization for the Throughput Enhancement of WiFi AP (WiFi AP 성능 향상을 위한 무선 자원 관리 최적화)

  • Jeong, Kil Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.131-136
    • /
    • 2012
  • In these days, with the diffusion of mobile equipments, the number of WiFi Access Point (AP) is increasing, and the growth of WiFi AP causes the throughput degradation due to interferences between APs. This recent phenomenon demands the method able to be utilized with current WiFi network to improve the throughput of Wireless LANs. This paper studied the channel assignment method and several throughput enhancement methods to optimize Radio Resource Management (RRM) for distributed infrastructure WLANs. As a result, it was able to put AP independently, improve older allocation error, and improve execution speed.

Effective Rogue Access Point Detection Method in Wireless LAN (무선랜 환경에서 효과적인 Rogue AP 탐지 기법)

  • Kang, Daehyun;Kim, Kangseok;Choi, Okkyung;Kim, Kihyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.733-734
    • /
    • 2011
  • 지난 몇 년 동안 무선랜(Wireless LAN)은 다양한 영역에서 가장 널리 사용 되었으며, 가장 크게 발전을 하였다. 그러나 무선랜의 특성상 해킹과 침투에 취약한 약점을 안고 있다. 아직도 많은 보안적 취약점을 가지고 있으며, 특히 그 중에서도 Rogue AP(Access Point)는 가장 심각한 보안 취약점으로 대두되고 있다. 현재 Rogue AP 탐지를 위하여 넷스텀블러와 같은 스니핑 소프트웨어를 설치하여 주변 지역을 돌아다니는 워드라이빙 형태의 탐지방법은 아직도 사용되고 있다. 그러나, 이러한 방법은 대규모로 확장되어 가는 무선랜 환경에 적합하지 않다. 본 논문은 무선랜 환경에서 Rogue AP 탐지 문제의 해결책을 제시한다. AP의 전파 영역을 이용하는 방식으로, AP가 신호를 받을 수 있도록 수정하여, 주변에 새로운 AP가 탐지될 경우, AP가 서버와 새롭게 발견된 AP에 신호를 보내고, 이를 바탕으로 서버는 WhiteList를 통해서 Rogue AP 여부를 결정한다. 따라서 본 논문의 제안 방식은 기존의 탐지 방식에 비해 Rogue AP의 효과적 탐지가 가능하다.

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF