Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32128
Effective Security Method for Wireless LAN using Life-Cycle of Wireless Access Point

Authors: Soon-Tai Park, Haeryong Park, Myoung-sun Noh, Yoo-Jae Won


There are many expand of Wi-Fi zones provided mobile careers and usage of wireless access point at home as increase of usage of wireless internet caused by the use of smart phone. This paper shows wireless local area network status, security threats of WLAN and functionality of major wireless access point in Korea. We propose security countermeasures concerned with life cycle of access point from manufacturing to installation, using and finally disposal. There needed to releasing with configured secure at access point. Because, it is most cost effective resolution than stage of installation or other life cycle of access point.

Keywords: Wireless LAN Security, Wi-Fi Security, Wireless Access Point, Product Life-Cycle

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1776


[2] CISCO, "Cisco Visual Networking Indes: Global Mobile Data Traffic Forecast Update, 2010- 2015", Feb. 2011.
[3] 20025&code=930201
[4] JiWire, "INSIGHTS JiWire Mobile Audience Insights Report Q4 2010", Feb. 2011
[5] Gyenam Lee etc, "Yr 2010, Survey for Behavior of Using Wireless Internet", KISA, Dec 2010.
[6] Soon-Tai Park, Yong-Geun Won, Jong-Hyun Baek, "A Study on Security Threats and Countermeasure for WLAN Environment", The 34th Korea Information Processing Society Fall Conference Proceeding Vol. 17, No. 2, pp. 1350-1353, Nov, 2010.
[7] Jong-Hyun Baek, Soon-Tai Park, "Wi-Fi Security status and Policy Direction in Korea", Review of Korea Institute of Information Security and Cryptology Vol. 21, No. 1, pp. 44-49, Feb, 2011.
[8] KCC, "A Comprehensive Plan for Smart Mobile Security in Korea", KCC, Dec 2010.
[9] Wi-Fi Alliance, "Wi-Fi CERTIFIED Wi-Fi Protected SeteupTM: Easing the User Experience for Home and Small Office Wi-FiÔôç Networks", Wi-Fi AllianceÔôç Dec, 2010
[10] Kevin Soo Hoo, Andrew W. Sudbury and Andrew R. Jaquith, "Tangible ROI through Secure Software Engineering", Secure Business Quarterly: Defining the Value of Strategic Security, 4th Quarter, 2001