• Title/Summary/Keyword: wireless security

Search Result 1,486, Processing Time 0.024 seconds

A study on the security system for wireless LAN (무선 LAN을 위한 보호시스템에 관한 연구)

  • 박영호;김철수
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.3
    • /
    • pp.107-115
    • /
    • 2002
  • The rapid progress of wireless LAN technology has prompted new security problems and countermeasures against them. Since the mobility of users and wireless access to the network exasperate potential security threat such as eavesdropping and illegal access, security services for wireless LAN should be provided. In this paper, we define the security model, WEP and AES encrypt/decrypt technologies which are proposed in the IEEE802.11 standard and the IEEE802.11eS draft and propose the Key distribution protocol for the wireless LAN.

  • PDF

Study of applicable security tunneling technique for military wireless network (군 무선네트워크 환경에서 적용 가능한 보안 터널링 기법 연구)

  • Kim, Yun-young;Namkung, Seung-Pil
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.107-112
    • /
    • 2015
  • Due to the rapid development of wireless communication technology, foundation system of military communication that is based on the daily use technology has been changed in to wireless system. However, military communication contains clssified information, and it is expected to have increase amount of enemy's there in such a imperfect security system. The next generation of tactical network communication system is expected to adopt All IP based wireless system. This research studies expected threatening factor on the wireless environment, and find the appropriate tunneling techniques.

Development of a Bi-Directional Security Light Control System based on Low-Bandwidth Wireless Sensor Network (저대역 센서 네트워크 기반의 양방향 보안등 관제 시스템 개발)

  • Lee, Ho-Gun;Lee, Sang-Ho;Lee, Suk-Gyu;Choi, Jeong-Won
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.10
    • /
    • pp.58-66
    • /
    • 2010
  • This paper shows an implementation and management result of wireless networks based security light control system, which performs a great role in protection of pedestrians and prevention of crime. Conventional security light units have severe limits in confirmation and inspection of security light unit failure, like wilful damage by someone or failure by influence of other equipment or failure by spontaneous heat-increase, and so on. In addition, local government offices are responsible for maintenance of security light units and as a matter of fact, most of civil complaints are about security light units. It is an obvious that the existing security light maintenance system reaches the limit and the security light maintenance problem is a difficulty of local government. Therefore, efficient security light control system is needed, which enables central control and intelligent maintenance. Moreover, the system has to be easy to control and has to be stable. In this study, wireless sensor network based security light control system is implemented, which is independent of programming language and platform, and which is simple to control and extend the system. The proven protocols, HTTP and SOAP, are utilized in order to improve the system reliability. This paper shows the excellence of our proposed system by implementing and operating it in real environment.

A Study on Wireless Network Management for Security Enhancement (보안강화를 위한 무선 네트워크 관리 방안에 관한 연구)

  • Lee, Eun-Sub;Kim, Young-Kon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.195-200
    • /
    • 2020
  • Wireless LANs are being used in many fields due to their ease of use. The biggest advantage of the WLAN can be said above all mobility. Domestic wired internet service has been saturated since 2006, but wireless internet users have been steadily increasing. However, WLAN has many advantages and characteristics of wireless service. It has a number of security vulnerabilities, and various security related technologies have been developed and applied to solve these problems. On the other hand, security awareness of WLAN users is still insufficient, and security accidents such as personal information leakage occur repeatedly every year. We will study the main weaknesses that can occur in WLAN and suggest security measures from the management level.

A Survey Study on Standard Security Models in Wireless Sensor Networks

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.31-36
    • /
    • 2014
  • Recent advancement in Wireless Sensor Networks (WSNs) has paved the way for WSNs to enable in various environments in monitoring temperature, motion, sound, and vibration. These applications often include the detection of sensitive information from enemy movements in hostile areas or in locations of personnel in buildings. Due to characteristics of WSNs and dealing with sensitive information, wireless sensor nodes tend to be exposed to the enemy or in a hazard area, and security is a major concern in WSNs. Because WSNs pose unique challenges, traditional security techniques used in conventional networks cannot be applied directly, many researchers have developed various security protocols to fit into WSNs. To develop countermeasures of various attacks in WSNs, descriptions and analysis of current security attacks in the network layers must be developed by using a standard notation. However, there is no research paper describing and analyzing security models in WSNs by using a standard notation such as The Unified Modeling Language (UML). Using the UML helps security developers to understand security attacks and design secure WSNs. In this research, we provide standard models for security attacks by UML Sequence Diagrams to describe and analyze possible attacks in the three network layers.

  • PDF

A Study of Security Requirement in Wireless Charging (무선충전에서 보안요구사항에 관한 연구)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.23-27
    • /
    • 2014
  • In recent times, there is an increasing interest in wireless charge of smartphones and devices, and many companies are developing wireless charges. The range of application of wireless charge would be expanded to almost all electronics, including not only mobile devices, but also notebook computers and vacuum cleaners. On-line electric vehicles are to be launched in the market this year in a massive scale. As such wireless charge-related markets are inexhaustible. Wireless charge is included in the world's top 10 promising technologies, and its rapid growth is expected to have annual growth by more than 100%. However, there's a need to establish a safe environment, by analyzing security threats to technical limitations and harmfulness to human body, and arrange institutional compliments. The development of communication method for a variety of wireless charging are delivering comfortable and safe information. This paper aims to examine the factors to threaten electric vehicle, which are usually intruded through network system and analyzes security threats to and security requirements for magnetic resonance mode-based wireless charge in mobile devices, and suggests security requirements.

A Security Threats in Wireless Charger Systems in M2M (M2M에서 무선충전 시스템의 보안 위협)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.1
    • /
    • pp.27-31
    • /
    • 2013
  • The fast-paced development in the field of wireless charger based on M2M, which is available anytime and anywhere, is being underway in accordance with the development of IT technology. Wireless charger technology in M2M has various security threats because it is based on wireless network. The purpose of this paper is to examine the threats of authentication and payment attacks based on wireless network attacks, and to propose the response technique that fit the situation of the wireless charger service by modifying the existing detecting authentication and payment through wireless charger.

Vulnerability Verification of 27 MHz Wireless Keyboards (27MHz 무선 키보드의 취약성 분석)

  • Kim, Ho-Yeon;Sim, Bo-Yeon;Park, Ae-Sun;Han, Dong-Guk
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2145-2152
    • /
    • 2016
  • Internet generalization has led to increased demands for Internet banking. Various security programs to protect authentication information are being developed; however, these programs cannot protect the wireless communication sections of wireless keyboards. In particular, vulnerabilities have been reported in the radio communication sections of 27 MHz wireless keyboards. In this paper, we explain how to analyze M's 27 MHz wireless keyboard. We also experimentally show that an attacker can acquire authentication information during domestic Internet banking using a 27 MHz wireless keyboard. To do this, we set up an experimental encironment to analyze the electromagnetic signal of a 27 MHz wireless keyboard.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

Analyses of Security Mechanism for Wireless Sensor Network (무선 센서 네트워망에서의 보안 메카니즘 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.744-747
    • /
    • 2008
  • Sensor networks will play an important role in the next generation pervasive computing. But its characteristic of wireless communication brings a peat challenge to the security measures used in the communication protocols. These measures are different from conventional security methods. In this paper, we proposed a security architecture for self-organizing mobile wireless sensor networks. It can prevent most of attacks based on intrusion detection.

  • PDF