Effective Security Method for Wireless LAN using Life-Cycle of Wireless Access Point

There are many expand of Wi-Fi zones provided mobile careers and usage of wireless access point at home as increase of usage of wireless internet caused by the use of smart phone. This paper shows wireless local area network status, security threats of WLAN and functionality of major wireless access point in Korea. We propose security countermeasures concerned with life cycle of access point from manufacturing to installation, using and finally disposal. There needed to releasing with configured secure at access point. Because, it is most cost effective resolution than stage of installation or other life cycle of access point.




References:
[1] http://en.wikipedia.org/wiki/Wireless_LAN
[2] CISCO, "Cisco Visual Networking Indes: Global Mobile Data Traffic
Forecast Update, 2010- 2015", Feb. 2011.
[3] http://news.khan.co.kr/kh_news/khan_art_view.html?artid=2010122621
20025&code=930201
[4] JiWire, "INSIGHTS JiWire Mobile Audience Insights Report Q4 2010",
Feb. 2011
[5] Gyenam Lee etc, "Yr 2010, Survey for Behavior of Using Wireless
Internet", KISA, Dec 2010.
[6] Soon-Tai Park, Yong-Geun Won, Jong-Hyun Baek, "A Study on Security
Threats and Countermeasure for WLAN Environment", The 34th Korea
Information Processing Society Fall Conference Proceeding Vol. 17, No.
2, pp. 1350-1353, Nov, 2010.
[7] Jong-Hyun Baek, Soon-Tai Park, "Wi-Fi Security status and Policy
Direction in Korea", Review of Korea Institute of Information Security
and Cryptology Vol. 21, No. 1, pp. 44-49, Feb, 2011.
[8] KCC, "A Comprehensive Plan for Smart Mobile Security in Korea",
KCC, Dec 2010.
[9] Wi-Fi Alliance, "Wi-Fi CERTIFIED Wi-Fi Protected SeteupTM: Easing
the User Experience for Home and Small Office Wi-FiÔôç Networks",
Wi-Fi AllianceÔôç Dec, 2010
[10] Kevin Soo Hoo, Andrew W. Sudbury and Andrew R. Jaquith, "Tangible
ROI through Secure Software Engineering", Secure Business Quarterly:
Defining the Value of Strategic Security, 4th Quarter, 2001