Commenced in January 2007
Paper Count: 30761
Effective Security Method for Wireless LAN using Life-Cycle of Wireless Access Point
Abstract:There are many expand of Wi-Fi zones provided mobile careers and usage of wireless access point at home as increase of usage of wireless internet caused by the use of smart phone. This paper shows wireless local area network status, security threats of WLAN and functionality of major wireless access point in Korea. We propose security countermeasures concerned with life cycle of access point from manufacturing to installation, using and finally disposal. There needed to releasing with configured secure at access point. Because, it is most cost effective resolution than stage of installation or other life cycle of access point.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1075132Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1533
 CISCO, "Cisco Visual Networking Indes: Global Mobile Data Traffic Forecast Update, 2010- 2015", Feb. 2011.
 http://news.khan.co.kr/kh_news/khan_art_view.html?artid=2010122621 20025&code=930201
 JiWire, "INSIGHTS JiWire Mobile Audience Insights Report Q4 2010", Feb. 2011
 Gyenam Lee etc, "Yr 2010, Survey for Behavior of Using Wireless Internet", KISA, Dec 2010.
 Soon-Tai Park, Yong-Geun Won, Jong-Hyun Baek, "A Study on Security Threats and Countermeasure for WLAN Environment", The 34th Korea Information Processing Society Fall Conference Proceeding Vol. 17, No. 2, pp. 1350-1353, Nov, 2010.
 Jong-Hyun Baek, Soon-Tai Park, "Wi-Fi Security status and Policy Direction in Korea", Review of Korea Institute of Information Security and Cryptology Vol. 21, No. 1, pp. 44-49, Feb, 2011.
 KCC, "A Comprehensive Plan for Smart Mobile Security in Korea", KCC, Dec 2010.
 Wi-Fi Alliance, "Wi-Fi CERTIFIED Wi-Fi Protected SeteupTM: Easing the User Experience for Home and Small Office Wi-FiÔôç Networks", Wi-Fi AllianceÔôç Dec, 2010
 Kevin Soo Hoo, Andrew W. Sudbury and Andrew R. Jaquith, "Tangible ROI through Secure Software Engineering", Secure Business Quarterly: Defining the Value of Strategic Security, 4th Quarter, 2001