한국통신학회논문지 B : 네트워크 및 융합 서비스, v.29, no.4C, pp.581-593
ISSN
1226-4717
Publisher
한국통신학회 (KICS)
Language
Korean
Type
Journal Article
Abstract
무선랜 시스템이 초고속 무선인터넷의 인프라로 자리 잡으면서 무선랜 보안에 관한 관심이 급속히 커가고 있다. 기존의 IEEE 802.11 기반의 무선랜 보안 요소라 할 수 있는 WEP 알고리즘의 취약점을 극복하기 위한 노력의 일환으로 Wi-Fi에서는 WPA 보안규격을 발표하였다. WEP 알고리즘을 사용하는 단말기와 WPA 지원 단말기가 동시에 존재하는 혼합모드 무선랜 환경에서는 각 단말기별 unicast용 pairwise 키 관리와 전체 단말기에 대한 broadcast용 group 키 관리가 훨씬 복잡하다. 본 논문에서는 pairwise 키와 group 키 관리를 위한 WPA authenticator 키 관리 상태머신의 취약점을 분석하고, 분석된 각각의 취약점을 극복할 수 있는 대응방안을 제시한다. 또한, 제시된 해결방안이 적용된 WPA authenticator 키 관리 상태머신의 재구성된 형태를 보인다. 본 논문에서 재구성한 키 관리 방식은 혼합모드 무선랜 환경에서 다양한 접속 방식의 단말기들에 대해서 group 키 교환과 group 키 업데이트 수행을 효과적으로 처리할 수 있는 토대를 제공한다.
KSP Keywords
IEEE 802.11
Copyright Policy
ETRI KSP Copyright Policy
The materials provided on this website are subject to copyrights owned by ETRI and protected by the Copyright Act. Any reproduction, modification, or distribution, in whole or in part, requires the prior explicit approval of ETRI. However, under Article 24.2 of the Copyright Act, the materials may be freely used provided the user complies with the following terms:
The materials to be used must have attached a Korea Open Government License (KOGL) Type 4 symbol, which is similar to CC-BY-NC-ND (Creative Commons Attribution Non-Commercial No Derivatives License). Users are free to use the materials only for non-commercial purposes, provided that original works are properly cited and that no alterations, modifications, or changes to such works is made. This website may contain materials for which ETRI does not hold full copyright or for which ETRI shares copyright in conjunction with other third parties. Without explicit permission, any use of such materials without KOGL indication is strictly prohibited and will constitute an infringement of the copyright of ETRI or of the relevant copyright holders.
J. Kim et. al, "Trends in Lightweight Kernel for Many core Based High-Performance Computing", Electronics and Telecommunications Trends. Vol. 32, No. 4, 2017, KOGL Type 4: Source Indication + Commercial Use Prohibition + Change Prohibition
J. Sim et.al, “the Fourth Industrial Revolution and ICT – IDX Strategy for leading the Fourth Industrial Revolution”, ETRI Insight, 2017, KOGL Type 4: Source Indication + Commercial Use Prohibition + Change Prohibition
If you have any questions or concerns about these terms of use, or if you would like to request permission to use any material on this website, please feel free to contact us
KOGL Type 4:(Source Indication + Commercial Use Prohibition+Change Prohibition)
Contact ETRI, Research Information Service Section
Privacy Policy
ETRI KSP Privacy Policy
ETRI does not collect personal information from external users who access our Knowledge Sharing Platform (KSP). Unathorized automated collection of researcher information from our platform without ETRI's consent is strictly prohibited.
[Researcher Information Disclosure] ETRI publicly shares specific researcher information related to research outcomes, including the researcher's name, department, work email, and work phone number.
※ ETRI does not share employee photographs with external users without the explicit consent of the researcher. If a researcher provides consent, their photograph may be displayed on the KSP.