ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper ZTA-based Federated Policy Control Paradigm for Enterprise Wireless Network Infrastructure
Cited 3 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Boo Geum Jung, Yoon-Sik Yoo, Kiwon Kim, Byoung-Sik Kim, Hyungkyu Lee, HeaSook Park
Issue Date
2022-10
Citation
Asia-Pacific Conference on Communications (APCC) 2022, pp.1-5
Publisher
IEEE
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1109/APCC55198.2022.9943635
Abstract
The increasing use of wireless devices comes with advances in Wi-Fi technology. Devices with a Wi-Fi interface use the wireless network for convenient connection. Wireless networks face a variety of security threats, such as mac spoofing, rogue twins, DDoS attack and sniffing. We propose a Zero Trust Architecture (ZTA) paradigm to supplement enterprise wireless network control and to enhance security. ZTA can protect enterprise network resources by authorizing only authenticated users and devices to access enterprise services. ZTA in this paper is implemented within Wi-Fi Protected Access (WPA) enterprise network environment and is named wireless-ZTA. After analyzing the implementation performance, it conducts a DDoS attack to prove a stealth enterprise service invisible to malicious adversaries. To verify the effectiveness of the proposed Wireless-ZTA, additional analysis such as a network blacken test that cannot be accessed except for authorized services was performed. This analysis leads to conclusions, along with insights into the future of ZTA in enterprise wireless networks.
KSP Keywords
DDoS attacks, IEEE 802.11(Wi-Fi), MAC spoofing, Network Control, Network Environment, Network resources, Policy control, Security threats, Wi-Fi protected access, Wi-Fi technology, Wireless devices