Effective Security Method for Wireless LAN using Life-Cycle of Wireless Access Point
There are many expand of Wi-Fi zones provided
mobile careers and usage of wireless access point at home as increase
of usage of wireless internet caused by the use of smart phone. This
paper shows wireless local area network status, security threats of
WLAN and functionality of major wireless access point in Korea. We
propose security countermeasures concerned with life cycle of access
point from manufacturing to installation, using and finally disposal.
There needed to releasing with configured secure at access point.
Because, it is most cost effective resolution than stage of installation or
other life cycle of access point.
[1] http://en.wikipedia.org/wiki/Wireless_LAN
[2] CISCO, "Cisco Visual Networking Indes: Global Mobile Data Traffic
Forecast Update, 2010- 2015", Feb. 2011.
[3] http://news.khan.co.kr/kh_news/khan_art_view.html?artid=2010122621
20025&code=930201
[4] JiWire, "INSIGHTS JiWire Mobile Audience Insights Report Q4 2010",
Feb. 2011
[5] Gyenam Lee etc, "Yr 2010, Survey for Behavior of Using Wireless
Internet", KISA, Dec 2010.
[6] Soon-Tai Park, Yong-Geun Won, Jong-Hyun Baek, "A Study on Security
Threats and Countermeasure for WLAN Environment", The 34th Korea
Information Processing Society Fall Conference Proceeding Vol. 17, No.
2, pp. 1350-1353, Nov, 2010.
[7] Jong-Hyun Baek, Soon-Tai Park, "Wi-Fi Security status and Policy
Direction in Korea", Review of Korea Institute of Information Security
and Cryptology Vol. 21, No. 1, pp. 44-49, Feb, 2011.
[8] KCC, "A Comprehensive Plan for Smart Mobile Security in Korea",
KCC, Dec 2010.
[9] Wi-Fi Alliance, "Wi-Fi CERTIFIED Wi-Fi Protected SeteupTM: Easing
the User Experience for Home and Small Office Wi-FiÔôç Networks",
Wi-Fi AllianceÔôç Dec, 2010
[10] Kevin Soo Hoo, Andrew W. Sudbury and Andrew R. Jaquith, "Tangible
ROI through Secure Software Engineering", Secure Business Quarterly:
Defining the Value of Strategic Security, 4th Quarter, 2001
[1] http://en.wikipedia.org/wiki/Wireless_LAN
[2] CISCO, "Cisco Visual Networking Indes: Global Mobile Data Traffic
Forecast Update, 2010- 2015", Feb. 2011.
[3] http://news.khan.co.kr/kh_news/khan_art_view.html?artid=2010122621
20025&code=930201
[4] JiWire, "INSIGHTS JiWire Mobile Audience Insights Report Q4 2010",
Feb. 2011
[5] Gyenam Lee etc, "Yr 2010, Survey for Behavior of Using Wireless
Internet", KISA, Dec 2010.
[6] Soon-Tai Park, Yong-Geun Won, Jong-Hyun Baek, "A Study on Security
Threats and Countermeasure for WLAN Environment", The 34th Korea
Information Processing Society Fall Conference Proceeding Vol. 17, No.
2, pp. 1350-1353, Nov, 2010.
[7] Jong-Hyun Baek, Soon-Tai Park, "Wi-Fi Security status and Policy
Direction in Korea", Review of Korea Institute of Information Security
and Cryptology Vol. 21, No. 1, pp. 44-49, Feb, 2011.
[8] KCC, "A Comprehensive Plan for Smart Mobile Security in Korea",
KCC, Dec 2010.
[9] Wi-Fi Alliance, "Wi-Fi CERTIFIED Wi-Fi Protected SeteupTM: Easing
the User Experience for Home and Small Office Wi-FiÔôç Networks",
Wi-Fi AllianceÔôç Dec, 2010
[10] Kevin Soo Hoo, Andrew W. Sudbury and Andrew R. Jaquith, "Tangible
ROI through Secure Software Engineering", Secure Business Quarterly:
Defining the Value of Strategic Security, 4th Quarter, 2001
@article{"International Journal of Electrical, Electronic and Communication Sciences:59439", author = "Soon-Tai Park and Haeryong Park and Myoung-sun Noh and Yoo-Jae Won", title = "Effective Security Method for Wireless LAN using Life-Cycle of Wireless Access Point", abstract = "There are many expand of Wi-Fi zones provided
mobile careers and usage of wireless access point at home as increase
of usage of wireless internet caused by the use of smart phone. This
paper shows wireless local area network status, security threats of
WLAN and functionality of major wireless access point in Korea. We
propose security countermeasures concerned with life cycle of access
point from manufacturing to installation, using and finally disposal.
There needed to releasing with configured secure at access point.
Because, it is most cost effective resolution than stage of installation or
other life cycle of access point.", keywords = "Wireless LAN Security, Wi-Fi Security, Wireless Access Point, Product Life-Cycle", volume = "5", number = "11", pages = "1540-4", }