Abstract
Recently, there has been an increased interest in wireless security equipment because of the proliferation of distributed wireless networks and wireless equipment. The security functions of wireless security equipment being used by organizations and companies provide remote users with access to a system after performing user identification and authentication, and allow encrypted data to be exchanged. However, since a consistent methodology for evaluating the vulnerability of wireless equipment has not yet been developed, it is difficult for evaluators and developers to properly evaluate the security of wireless equipment. To solve these problems, we propose an environment for vulnerability testing and outline trends in the development of wireless security equipment and security functions.
This research was supported by the Ministry of Knowledge Economy (MKE), Korea, under the “ITRC” support program supervised by the National IT Industry Promotion Agency (NIPA) (NIPA-2011-C1090-1001-0004). Also, this work was supported by grant project (No. 2011-034) of KISA.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Common Criteria for Information Technology Security Evaluation, version 3.1, CCMB-2006-09
National Cyber Security Center (2008) Wireless authentication system protection profile
US Government Information Assurance Directorate (2007) Wireless local area network client protection profile for basic robustness environment
Common Criteria Portal Certified Products Security Target. http://www.commoncriteriaportal.org
National Cyber Security Center Certified Products Certified Report. http://service1.nis.go.kr/
Lee K, Won D, Kim S (2011) A secure and efficient E-Will system based on PKI. Inf Int Interdiscip J Int Inf Inst 14(7):2187–2206
Lee Y, Kim S, Won D (2010) Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Elsevier Comput Electr Eng 36(1):213–223
Lee K, Lee Y, Won D, Kim S (2010) Protection profile for secure E-voting systems. In: Proceedings of ISPEC 2010, Information security practice and experience conference 2010, LNCS 6047. Springer, Seoul, Korea, pp 386–397, 12–13 March
Common Criteria Portal Certified Products. http://www.commoncriteriaportal.org/products/
National Cyber Security Center Certified Products. http://service1.nis.go.kr/
CVE, Internet site for vulnerability analysis. http://cve.mitre.org/
Andrew A, Konstantin V, Andrei A (2004) WI-FOO: the secrets of wireless hacking, Pearson, Upper Saddle River
Park N, Song Y, Won D, Kim H (2008) Multilateral approaches to the mobile RFID security problem using web service. In: Zhang Y, Yu G, Bertino E, Xu G (eds) APWeb 2008. LNCS, vol 4976. Springer, Heidelberg, pp 331–341
Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: Shen HT, Li J, Li M, Ni J, Wang W (eds) APWeb workshops 2006. LNCS, vol 3842. Springer, Heidelberg, pp 741–748
Park N, Kim S, Won D (2007) Privacy preserving enhanced service mechanism in mobile RFID network. In: ASC, Advances in soft computing, vol 43. Springer, Heidelberg, pp 151–156
Park N (2010) Security scheme for managing a large quantity of individual information in RFID environment. In: CCIS, Communications in computer and information science, vol 106. Springer, Heidelberg, pp 72–79
Park N, Kim S, Won D, Kim H (2006) Security analysis and implementation leveraging globally networked mobile RFIDs. In: PWC 2006. LNCS, vol 4217. Springer, Heidelberg, pp 494–505
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media B.V.
About this paper
Cite this paper
Park, N., Lee, C., Lee, K., Won, D. (2011). A Study on the Development of Security Evaluation Methodology for Wireless Equipment. In: Park, J., Arabnia, H., Chang, HB., Shon, T. (eds) IT Convergence and Services. Lecture Notes in Electrical Engineering, vol 107. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2598-0_25
Download citation
DOI: https://doi.org/10.1007/978-94-007-2598-0_25
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2597-3
Online ISBN: 978-94-007-2598-0
eBook Packages: EngineeringEngineering (R0)