• Title/Summary/Keyword: WPA3

Search Result 16, Processing Time 0.028 seconds

N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication (NFT를 이용한 4-방향 핸드셰이크의 키 교환이 없는 실용적인 WPA2)

  • Tae-Young Eun;Alshihri Saad;Soo-Yong Park
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.197-208
    • /
    • 2023
  • In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a protocol with various vulnerabilities at this time. In order to use WPA2-EAP or WPA3 (2018), which were released to compensate for the vulnerabilities of WPA2, additional equipment upgrades are required for STA (station) and AP (access point, router), which are connected devices. The use of expensive router equipment solves the security part, but it is economically inefficient to be introduced in Small Office Home Office (SOHO). This paper uses NFT as a means of authentication and uses the existing WPA2 as it is without equipment upgrade, defend crack tools of WPA2 that have been widely used so far and compared to the existing WPA2, it was shown that it was not difficult to actually use them in SOHO.

A study on synthesis and mechanical properties polyurethane-acrylic hybrid resin with milk casein (Milk casein을 이용한 수용성 polyurethane-acrylic hybrid resin의 합성 및 물성 영향에 관한 연구)

  • Lee, Joo-Youb;Nam, Sang-Sung
    • Journal of the Korean Applied Science and Technology
    • /
    • v.30 no.3
    • /
    • pp.567-574
    • /
    • 2013
  • For this research, prepared water soluble milk casein resin and waterborne polyurethane-acrylic resin. Use these resin, this article has been analyzed about change of mechanical properties by increasing amount of casein resin in polyurethane-acrylic resin on coated leather. According to measure data for solvent resistance, WPA(waterborne polyurethane-acrylic resin) resin and WPA-C1, C2, C3(samples of polyurethane-acrylic resin with milk casein resin) had good property. As known in the results, increase of casein constant did not influence to big change of hybrid resin properties. As test of tensile strength, WPA had lowest tensile characteristic(1.598 $kg_f/mm^2$) and WPA-C3 had highest tensile characteristic(1.718 $kg_f/mm^2$). Also best properties of abrasion was WPA-C3(06.021 mg.loss). In elongation case, WPA had best properties(754 %) in this experiment.

Efficient Wi-Fi Security Protocol Using Dual Tokens (이중토큰을 이용한 효율적인 Wi-Fi 보안 프로토콜)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.417-429
    • /
    • 2019
  • WPA2-PSK uses a 4-way handshake protocol based on a shared secret to establish a secure session between a client and an AP. It has various security problems such as eavesdropping attacks and the secure session establishment process is inefficient because it requires multiple interactions between client and AP. The WPA3 standard has recently been proposed to solve the security problem of WPA2, but it is a small improvement using the same 4-way handshake methodology. OAuth 2.0 token authentication is widely used on the web, which can be used to keep an authenticated state of a client for a long time by using tokens issued to an authenticated client. In this paper, we apply the dual-token based randomized token authentication technology to the Wi-Fi security protocol to achieve an efficient Wi-Fi security protocol by dividing initial authentication and secure session establishment. Once a client is authenticated and equipped with dual tokens issued by AP, it can establish secure session using them quickly with one message exchange over a non-secure channel.

Survival Analysis of Patients with Brain Metastsis by Weighting According to the Primary Tumor Oncotype (전이성 뇌종양 환자에서 원발 종양 가중치에 따른 생존율 분석)

  • Gwak, Hee-Keun;Kim, Woo-Chul;Kim, Hun-Jung;Park, Jung-Hoon;Song, Chang-Hoon
    • Radiation Oncology Journal
    • /
    • v.27 no.3
    • /
    • pp.140-144
    • /
    • 2009
  • Purpose: This study was performed to retrospectively analyze patient survival by weighting according to the primary tumor oncotype in 160 patients with brain metastasis and who underwent whole brain radiotherapy. Materials and Methods: A total of 160 metastatic brain cancer patients who were treated with whole brain radiotherapy of 30 Gy between 2002 and 2008 were retrospectively analyzed. The primary tumor oncotype of 20 patients was breast cancer, and that of 103 patients was lung cancer. Except for 18 patients with leptomeningeal seeding, a total of 142 patients were analyzed according to the prognostic factors and the Recursive Partitioning Analysis (RPA) class. Weighted Partitioning Analysis (WPA), with the weighting being done according to the primary tumor oncotype, was performed and the results were correlated with survival and then compared with the RPA Class. Results: The median survival of the patients in RPA Class I (8 patients) was 20.0 months, that for Class II (76 patients) was 10.0 months and that for Class III (58 patients) was 3.0 months (p<0.003). The median survival of patients in WPA Class I (3 patients) was 36 months, that for the patients in Class II (9 patients) was 23.7 months, that for the patients in Class III (70 patients) was 10.9 months and that for the patients in Class IV (60 patients) was 8.6 months (p<0.001). The WPA Class might have more accuracy in assessing survival, and it may be superior to the RPA Class for assessing survival. Conclusion: A new prognostic index, the WPA Class, has more prognostic value than the RPA Class for the treatment of patients with metastatic brain cancer. This WPA Class may be useful to guide the appropriate treatment of metastatic brain lesions.

Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN (무선 랜 환경 인증 메커니즘의 취약성 분석 및 대응방안 연구)

  • Choi, Jin-Ho;Oh, Soohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1219-1230
    • /
    • 2012
  • Recently, lots of users are using wireless LAN providing authentication and confidentiality with security mechanism such as WEP, WPA. But, weakness of each security mechanism was discovered and attack methods that user's information was exposed or modified to the third parties with it and abused by them were suggested. In this paper, we analyzed architecture of security mechanisms in wireless LAN and performed PSK cracking attack and cookie session hijacking attack with the known vulnerability. And, an improved 4-way handshake mechanism which can counter PSK cracking attack and a cookie replay detection mechanism which can prevent cookie session hijacking attack were proposed. Proposed mechanisms are expected to apply to establish more secure wireless LAN environment by countering existing vulnerability.

Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network

  • Aloufi, Hanouf;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.194-202
    • /
    • 2022
  • The use of public Wi-Fi has increased in recent years with many people like to spend their time outside in malls or café shops which provide public Wi-Fi for their customers. However, since the public Wi-Fi can be accessed from any device the security of public Wi-Fi plays a big role to prevent the stealing of information by an attacker with methods and techniques such as WPA, WPA2 and WPA3. However, it is well known to the attackers that these methods are not difficult to get hacked by the attacker device to take the client precious information. Some researches were done in increasing the security of public Wi-Fi each with their own different technique or algorithm to provide more secure connection to the public Wi-Fi and prevent any unauthorized user to connect to avoid stealing the data of another legal user. Theses research paper are evaluated to learn which method excel in protecting the public Wi-Fi security by giving an analysis to the methods provided by the research paper with comparing the pros and cons of each algorithm. Moreover, the research displays that there are methods to actually provide security to the public Wi-Fi with each being very different in implementation.

Review on the Protected Areas Issues within Mid-Long Term National Plans for Territory and Environment of Korea; Focus on the "Biodiversity 2011-2020 Strategic Targets" and "Protected Areas Decision" (우리나라 국토 및 환경 분야 중장기 국가계획의 보호지역 관련 내용 고찰 - "생물다양성협약 2011~2020 전략목표" 및 "보호지역 결정문" 내용을 중심으로-)

  • Heo, Hag Young
    • Journal of Environmental Policy
    • /
    • v.11 no.4
    • /
    • pp.3-37
    • /
    • 2012
  • In perspective of biodiversity conservation and protected areas (PAs), the aims of the study are to review the mid-long term national plans, which deal with national territory and environment in Korea, and to find out the way to improve this issue. Key issues were drawn by referring "Biodiversity 2011-2020 Strategic Targets" and "Protected Area Decision" in CBD CoP-10 and 7 National comprehensive or basic Plans were reviewed. Quoting Biodiversity 2011-2020 Strategic Target 5, "By 2020, the rate of loss of all natural habitats, including forests, is at least halved and where feasible brought close to zero, and degradation and fragmentation is significantly reduced", most of national plans included various methods such as "No Net Loss of Green", "No Net Loss of Wetlands", and so on. Regarding the target 11, "By 2020, at least 17% of terrestrial and inland water, and 10% of coastal and marine areas, ecologically representative and well connected systems of PAs and other effective area-based conservation measures, and integrated into the wider landscape and seascapes", 15% by 2015 was set up as a target of total PAs in Korea and 13% by 2015 or 2020 was set up as a target of coastal and marine PAs. CBD CoP-10 Decision X/31 (Protected Areas) invites parties to develop a national long-term action plan for the implementation of PoWPA and describes 10 issues that need greater attention. National action plan for the implementation of PoWPA doesn't be mentioned at any national plans even PoWPA. Regarding the 10 issues, most of issues were well reflected within various national plans, however there is still a need to improve the details and corelation between plans. Particularly, in terms of management effectiveness evaluation (MEE), there was no national plan to directly deal with MEE even though CBD invites parties to work towards assessing 60% of the total PAs by 2015. Based on the review results, below 4 items were suggested; (1)"The Comprehensive Plan of the National Territory" needs more attention on the Biodiversity Conservation and PAs, (2)Consider to establish "National PA System Plan" embedded into "the Comprehensive Plan of National Environment", (3)Establish a "National Action Plan for the implementation of PoWPA", (4)Improve the National Plans through linking with Biodiversity 2011-2020 Strategic Targets and relevant PA key issues.

  • PDF

Face Region Detection and Verification using both WPA and Spatially Restricted Statistic (공간 제약 특성과 WPA를 이용한 얼굴 영역 검출 및 검증 방법)

  • Song, Ho-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.542-548
    • /
    • 2006
  • In this paper, we propose a face region detection/verification method using wavelet packet analysis and structural statistic for frontal human color image. The method extracts skin color lesions from input images, first. and then applies spatial restrictive conditions to the region, and determines whether the region is face candidate region or not. In second step, we find eye region in the face candidate region using structural statistic for standard korean faces. And in last step, the face region is verified via wavelet packet analysis if the face torture were satisfied to normal texture conditions.

Distribution of Fish Species in Wetland Protected Areas in South Korea

  • Chu, Yeounsu;Yoon, Jungdo;Cho, Kwang-Jin;Kim, Mijeong;Lim, Jeongcheol;Lee, Changsu
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.2 no.1
    • /
    • pp.42-52
    • /
    • 2021
  • In order to secure basic data on biodiversity for wetland conservation and management used the data from Wetland Protected Area surveys conducted in South Korea (2015-2019) to analyze the distribution of fish from a total of 15 orders, 45 families, 134 species, and 12,972 individuals. The predominant species identified were Zacco platypus (Temminck and Schlegel) (19.47%) and Zacco koreanus (Kim, Oh and Hosoya) (8.16%). Of all emergent species, 52.9% (n=71 species) were freshwater species, 26.9% (n=36) were brackish species, 3.0% (n=4) were migratory species, 27% (n=36) were marine species, and 9.0% (n=12) were riffle benthic species. Overall, 5.2% (n=7 species) were endangered species, 3.0% (n=4) were exotic species, and 23.1% (n=31) were Korean endemic species. The eight identified Wetland Protected Areas (WPA) were classified based on their habitat characteristics and on the analysis of their emergent fish communities, as estuarine (n=2), coastal dune (n=1), marsh (n=2), stream (n=2), and stream-marsh (n=1) types. The environmental factors revealed to have the greatest influence on the species diversity of emergent fish were maintenance and repair, installation of reservoirs, and construction of artificial wetlands around them. The present study offers basic information on the diversity of fish species in different Wetland Protected Area types that can be used to inform conservation and management decisions for WPA.

A Study on Method of Citizen Science and Improvement of Performance as a Ecosystem Conservation and Management Tool of Wetland Protected Areas (Inland Wetland) - Focused on the Target of Conservation·Management·Utilization in Wetland Protected Area Conservation Plan - (내륙 습지보호지역의 생태계 보전·관리 도구로서 시민과학연구 방법론 및 성과 제고 방안 - 습지보호지역 보전계획의 보전·관리·이용 목표를 중심으로 -)

  • Inae Yeo;Changsu Lee;Ji Hyun Kang
    • Journal of Environmental Impact Assessment
    • /
    • v.32 no.6
    • /
    • pp.450-462
    • /
    • 2023
  • This study suggested methodology of Citizen Science as a tool of ecosystem conservation and management to achieve Wetland Protected Area (WPA) Conservation Plan and examined whose applicability in 3 WPAs (Jangrok of Gwangju metropolitan city, Madongho of Goseong in South Gyeongsang Province, and Incheongang estuary of Gochang in North Jeolla Province). It consists of a) figuring out main interests and stakeholder or beneficiaries of WPA and their information demand based on conservation, utilization, and management target in the WPA Conservation Plan, b) conducting research activities to gain outcome to address stakeholder's demand, and c) returning the research outcome to citizen scientists and making diffusion to the society. Based on the suggested method and process, citizen scientists conducted ecosystem monitoring (plants including Invasive Alien Plants, terrestrial insects, traces of mammals, discovering unknown wetland). As a result, citizen scientists contributed to collecting species information of 16 plans, 43 species of terrestrial insects, 5 mammals including Lutra lutra (Endangered Species I) and Prionailurus bengalensis (Endangered Species II). The authors constructed and provided distribution map of Invasive Alien Plants, which included information of location and density which citizen scientists registered, for Environment Agencies and local governments who manage 3 WPAs to aid data-based ecosystem policy, In further studies, not only accumulating research data and outcomes acquired from citizen science to suffice the policy demands but also deliberate reviewing policy applicability and social·economic ripple effect should be processed for the suggested Citizen Science in WPA to be settled down as a tool of ecosystem conservation and management.