• Title/Summary/Keyword: wlan security

Search Result 79, Processing Time 0.026 seconds

Internetworking strategy between MANET and WLAN for Extending Hot-Spot of WLAN based on HMIPv6 (HMIPv6를 기반으로 한 무선 랜과 이동 애드 혹 네트워크 간의 인터네트워킹 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.38-48
    • /
    • 2006
  • For extending of hot-spot of WLAN, (2) proposes internetworking scheme between wireless LAN (WLAN) and mobile ad-hoc network (MANET), which employ the same layer-2 protocol with different mode. Compared to internetworking schemes between UMTS (Universal Mobile Telecommunications Systems) and WLAN (3-4), the scheme from (2) has relatively low overhead and latencies because WLAN and MANET are physically and logically similar to each other. However, the mode switching algorithm proposed in r2] for internetworking between WLAN and MANET only considers signal strength and determines handoff, and mobile nodes following a zigzag course in pollution area may perform handoff at short intervals. Furthermore, (2) employs mobile IPv6 (MIPv6) at base, which brings still high delay on handoff and overhead due to signal message exchange. In this paper, we present optimized internetworking scheme between WLAN and MANET, modified from (2). To settle ping-pong handoff from (2), we propose adaptive mode switching algorithm. HMIPv6 is employed for IP connectivity and mobility service in WLAN, which solves some shortcomings, such as high handoff overhead and vulnerable security. For routing in MANET, OLSR is employed, which is a proactive Protocol and has optimally reduced signal broadcasting overhead. OLSR operates with current P protocol compatibly with no change or modification. The proposed internetworking scheme based on adaptive mode switching algorithm shows better performance than scheme from (2).

A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device (모바일 단말을 이용한 Whitelist 기반 비인가 AP 탐지 및 접속 차단 기법)

  • Park, Jungsoo;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.632-640
    • /
    • 2013
  • In this paper, we proposed a system in a wireless LAN environment in case of security threats, the mobile terminal and the remote server-based WLAN security. The security of the wireless LAN environment in the recent technology in a variety of ways have been proposed and many products are being launched such as WIPS and DLP. However, these products are expensive and difficult to manage so very difficult to use in small businesses. Therefore, in this paper, we propose a security system, wireless LAN-based terminal and a remote server using whitelist according to development BYOD market and smartphone hardware. The proposed system that AP and personal device information to be stored on the server by an administrator and Application installed on a personal device alone, it has the advantage that can be Applicationlied to a variety of wireless network environment.

Development of a RADIUS WLAN Security System for Industrial Applications Based on WEB (WEB 기반의 기업용 RADIUS 무선랜 보안 시스템 개발)

  • Jeong, Yeon-Woo;Sohn, Jong-Yoon;Chun, Joong-Chang;Choi, Kyung-Sun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.599-603
    • /
    • 2016
  • Recently the wireless LAN system is substituting wired LAN system notably as the number of mobile users increases greatly along the advancement of technology. But the wireless LAN has a critical weakness in the security such as data leakage. Thus a safe security system is imperative to avoid threatening from hackers with offering the best convenience to inner users. In this research, we have developed a RADIUS wireless LAN security system for industrial applications, which performs the EAP authentication with the compatibility for any maker of wireless LAN. The system has interfaces based on WEB, providing DB access function for user management so that users can perform authentication of 802.1x in their computers.

A Method of Authenticating WLAN APs for Smartphones (스마트폰을 위한 무선 AP 인증 방법)

  • Shin, DongOh;Kang, Jeonil;Nyang, DaeHun;Lee, Sokjoon;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.17-28
    • /
    • 2014
  • The increase of smartphone users have made mobile carriers offload increasingly congested traffic of 3/4G by providing Wi-Fi hot-spots in the public places such as coffee shops and subway stations. In the traditional authentication in WLAN, the users should convince the service providers that they are valid customers before they use WLAN services. Since the authentication protocol is designed for service providers. Even with the mutual authentication based on the IEEE 802.1X, which is supported by IEEE 802.11 standard, it is difficult to be convinced of that the service providers really have installed the WLAN APs, which users are confronted with. An attacker can install rogue APs that masquerade as legitimate APs by copying the SSID, MAC address, etc. in order to obtain users' private information. In this paper, we introduce a method of authenticating legitimate APs for smartphone users. And we show our proposal can be well utilized for the current Wi-Fi hot-spots as a security plug-in and prove it through our experiments.

An Improved Ticket-based EAP-AKA Protocol for Interworking of UMTS, WLAN, and WiBro (UMTS-WLAN-WiBro 연동을 위한 티켓기반의 개선된 EAP-AKA 프로토콜)

  • Lee Kyoung-Shin;Kim Dae-Young;Kim Sang-Jin;Oh Hee-Kuck
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.501-505
    • /
    • 2006
  • 다양하게 제공되고 있는 무선 네트워크 서비스를 통합하기 위한 보안 연동 기술 개발이 활발히 이루어지고 있다. 통합 보안 연동 기술을 위해 IETF에서 EAP-AKA(Extensible Authentication Protocol-Authentication and Key Agreement)[8]가 표준으로 제안되었지만 HN(Home Network)이 MS(Mobile Station)를 직접 인증하지 못하고 사용자의 permanent identity가 노출되는 등 여러 보안상의 문제점이 제기되고 있다. 또한 SN(Serving Network)이 필요로 하는 저장 공간이 너무 많고 SN과 HN 사이의 대역폭 낭비, 동기화 문제 등 효율성에 있어서도 문제점이 제기되고 있다. 이 논문에서는 개선한 AKA(Authentication and Key Agreement)[12] 프로토콜을 PEAP(Protected EAP)에 적용하여 기존 EAP-AKA보다 안전하고 효율적인 티켓기반의 프로토콜을 제안한다. 제안하는 프로토콜은 HN과 MS 간의 상호 인증을 보장하고 사용자의 permanent identity를 보호하여 안전하고, 계산량과 저장 공간에 있어 기존의 EAP-AKA보다 효율적이다.

  • PDF

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

Lightweight Packet Authentication for Access Control in IEEE 802.11 (IEEE 802.11에서의 접근 제어를 위한 Lightweight 패킷 인증)

  • Lee, Keun-Soon;Kim, Hyo-Jin;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.29-38
    • /
    • 2005
  • Because IEEE 802.11 has several security vulnerabilities, IEEE 802.11i was proposed and accepted. But IEEE 802.11i has much overhead for most of users for the web surfing. Besides not only node the authentication but also the packet authentication is needed to communicate. Although IEEE 802.11i uses TKIP(Temporal Key integrity Protocol) and CCMP(CTR with CBC-MAC Protocol), they have a lot of overheads. In this paper, Lightweight Packet Authentication(LIPA) is proposed. LIPA has less overhead and short delay so that it can be affordable for simple web-surfing which does not need stronger security. After comparing performances of LIPA with those of TKIP and CCMP, LIPA is more efficient than other schemes for transmitting packets.

Design and Implementation of User Authentication Schemes for Roaming in Public Wireless LAM Systems (공중 무선랜 시스템에서 로밍을 고려한 사용자 인증방식의 설계 및 구현)

  • Lee, Hyun-Woo;Kim, Jeong-Hwan;Ryu, Won;Yoon, Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8B
    • /
    • pp.755-761
    • /
    • 2004
  • Currently, Wireless LAN(WLAN) service is widely deployed to provide high speed wireless Internet access through the mobile stations such as notebook and PDA. To provide enhanced security and user access control in the public WLAN area, WLAM access points should have the capability of IEEE 802.1x-based user authentication and authorization functionality. In this paper, we provide a brief understanding of IEEE 802. 1x standards and related protocols likeEAPoL(Extended Authentication Protocol Over LAN), EAP, RADIUS and describe how the IEEE 802.1x is designed and implemented in our embedded linux-based WLAN AP which is named i-WiNG.(Intelligent Wireless Internet Gateway).

WLAN Vulnerabilities Analysis by AV analysis (단위취약성 분석을 통한 무선랜 취약점 분석 방법)

  • Kim, Dong-Hyun;Ko, Kyoung-Hee;Kim, Hyung-Jong;Shin, Dong-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1921-1924
    • /
    • 2003
  • 최근 무선 네트워크의 이용이 증가하고 있다. 일반적으로 무선 네트워크 환경은 유선 네트워크 환경 보다 취약한 것으로 알려져있다. 본 논문에서는 무선랜 취약점과 이동 단말 운영체제 취약점 분석에 단위 취약성과 복합 취약성을 이용한 취약점 분석 방법을 적용하여본다. 단위 취약성 분석 방법은 Bishop의 가설을 바탕으로 보안 취약성 평가를 위한 시뮬레이션에 적용할 수 있도록 구체화한 것이다. 이를 통하여 단위 취약성 분석방법이 무선 환경까지 적용가능한지를 알아보고, 그 특성을 알아본다.

  • PDF

A Study on Security Threats and Countermeasure for WLAN Environment (무선랜 이용 환경별 보안위협 및 대응방안)

  • Park, Soon-Tai;Won, Yong-Geun;Baek, Jong-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1350-1353
    • /
    • 2010
  • 최근, 스마트폰 등 무선랜 이용가능 단말기의 출시와 저렴한 무선 AP(Access Point) 보급 확대로 무선랜 이용이 급속히 확대되고 있다. 그동안 국내 무선인터넷 환경은 이동통신사가 구축한 고비용 폐쇄적 3G 네트워크의 데이터 통신 위주로 이루어졌으며, 무선랜 이용은 일부 기업환경 및 호텔/식당 등의 고객용 무선랜, 개인용 무선랜 등으로 한정되어 사용되었다. 하지만 '10년 스마트폰의 폭발적인 확산으로 무선랜을 통해 빠르고 저렴하게 무선 인터넷을 사용할 수 있게 됨에 따라 가정, 공공시설 등에서 무선랜 구축/활용이 매우 증가하고 있다. 논문은 무선랜에 대한 물리적, 기술적, 관리적 보안위협을 살펴보고 구축, 관리, 이용 주체별 대응방안을 제시한다.