Designs of a Secure Wireless LAN Access Technique and an Intrusion Detection System for Home Network
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Tae-Sub | - |
dc.contributor.author | Kim, Yi-Kang | - |
dc.contributor.author | Lee, Byung-Bog | - |
dc.contributor.author | Ryu, Seung-Wan | - |
dc.contributor.author | Cho, Choong-Ho | - |
dc.date.accessioned | 2023-03-21T08:40:49Z | - |
dc.date.available | 2023-03-21T08:40:49Z | - |
dc.date.issued | 2008-09 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/66335 | - |
dc.description.abstract | JEEE 802.11i standard supports a secure access control for wireless LAN and JEEE 802.1x standard includes various authentication method protocols. P is expected that next generation wireless LAN security techniques will be based on JEEE 802.1x and IEEE 802.11i standards. However, at present users who are not familiar with a computer and an authentication details have difficulty to setup the network security based on JEEE 802.11i. Accordingly, this paper proposes authentication scenarios to minimize the process needed by users, a password method which is changed randomly and periodically, and authentication protocols. The proposed protocols provide convenience for nonprofessional computer users as well as secure the home network environment against the unwanted attacks such as a dictionary attack or a replay attack and it uses SNMP and the system to be able to detect an intrusion it supposes will occur. | - |
dc.format.extent | 7 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.title | Designs of a Secure Wireless LAN Access Technique and an Intrusion Detection System for Home Network | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/NCM.2008.46 | - |
dc.identifier.bibliographicCitation | NCM 2008 : 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 1, PROCEEDINGS, v.1, pp 318 - 324 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.wosid | 000260994100059 | - |
dc.identifier.scopusid | 2-s2.0-57849148618 | - |
dc.citation.endPage | 324 | - |
dc.citation.startPage | 318 | - |
dc.citation.title | NCM 2008 : 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 1, PROCEEDINGS | - |
dc.citation.volume | 1 | - |
dc.type.docType | Proceedings Paper | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.