DOI QR코드

DOI QR Code

A Design Communication System for Message Protection in Next Generation Wireless Network Environment

차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계

  • Min, So-Yeon (Department of Information Communication, Seoil University) ;
  • Jin, Byung-Wook (Department of Computer Science, Soongsil University)
  • Received : 2015.06.29
  • Accepted : 2015.07.16
  • Published : 2015.07.31

Abstract

These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

전 세계의 인구가 1인 평균 2대의 모바일 디바이스를 소지하는 시대가 다가오고 있으며 무선 네트워크 시장이 점차 확장되고 있다. 모바일 기기의 활용도가 높아짐에 따라서 와이파이(Wi-fi, Wireless Fidelity=Wireless LAN)가 선호하는 네트워크로 떠오르고 있다. 와이파이를 기반으로 공공기관, 의료, 교육러닝 및 콘텐츠, 제조, 리테일 등 다양한 영역에서 새로운 가치를 창출해가고 있으며, 글로벌 네트워크가 구축되어 복합적인 서비스를 제공하고 있다. 하지만 차세대 무선 네트워크 환경에서 무선 디바이스 식별자 취약, MAC 위조를 통한 네트워크 자원의 불법 이용, 무선 인증키 크래킹, 미허가 AP/디바이스에 대한 공격과 같은 취약점이 존재하고 있다. 또한 인증 고도화 및 안전한 고속 보안 접속과 같은 보안기술연구가 거의 진행되고 있지 않다. 그러므로 본 논문에서는 차세대 무선 네트워크 환경의 메시지 보호를 위한 디바이스 식별과 콘텐츠 분류 및 저장 프로토콜을 설계하여 안전한 통신 시스템을 설계한다. 제안한 프로토콜은 기존의 무선 네트워크 환경에서 발생하는 보안취약점에 관하여 안전성을 분석하였고 기존의 무선 네트워크 환경의 암호기법을 비교분석하여 보안성을 분석하였다. 기존의 암호시스템 WPA2-PSK보다는 대략 0.72배 느리지만, 보안성에서는 안전성을 강화되었다.

Keywords

Acknowledgement

Supported by : 서일대학교

References

  1. TTA, "Security Requirements for WLAN Fast Link Set-up in Enterprise Environment", 2014. 12.
  2. TTA, "Functional Requirements for Wireless Device Identification in WLAN", 2013. 12.
  3. TTA, "Architecture and Interface for Wireless Device Identification in WLAN", 2014. 12.
  4. Sin-hyo Kim, "Next Wireless Lan Security Technology", 2013. 12.
  5. Kisa, "Security guide of easy-to-understand public wireless LAN", 2011. 12.
  6. KCA, "Wireless LAN security technology trends of the next generation and challenges", 2013.
  7. Joo-Hyung Son, Next-generation wireless LAN standard IEEE 802.11ax Standardization, Telecom Korean, 2014. 8. DOI: http://dx.doi.org/10.1109/QSHINE.2014.6928663
  8. IEEE 802.11: Standard for Information Technology Telecommunications and information exchange between systems-Local and metropolitan area network-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, 2012. DOI: http://dx.doi.org/10.1109/IEEESTD.2012.6178212
  9. Kwansik Yoon, "A Mechanism for Controlling Accesses Dynamically in Smartwork Environment", VOL. 19 NO. 02 PP. 877-880, 2012. 11.
  10. Jae-Sung Park, Jae-Sang Cha, Chong-Hoon Lee, Heung-Mook Kim, Sung-Woong Choi, Ju-Phill Cho, Yong-Woon Park, Jin-Young Kim, "Phase Offset Estimation Based on Turbo Decoding in Digital Broadcasting System", The Journal of The Institute of Webcasting, Internet Television and Telecommunication, Vol. 9 No. 2, pp. 111-116, 2009.
  11. Young-Do Joo, "Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks," The Journal of The Institute of Webcasting, Internet Television and Telecommunication, Vol. 14 No. 1, pp. 147-153, 2014.
  12. Gang-Seok Kim, Jee-Wan Huh, Wang-Cheol Song, "Zone based on Wireless Sensor Network Management Protocol for Smart Home," The Journal of The Institute of Webcasting, Internet Television and Telecommunication, Vol. 09 No. 5, pp. 65-71, 2009.

Cited by

  1. The case study on wireless lan design technique for Bansong purification plant using network integrated management system and security switch vol.32, pp.4, 2018, https://doi.org/10.11001/jksww.2018.32.4.309