Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0231 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2013-12-18 ÃÑÆäÀÌÁö 30
ÇѱÛÇ¥ÁØ¸í ¹«¼± ·£¿¡¼­ ¹«¼± µð¹ÙÀ̽º ½Äº°À» À§ÇÑ ±â´É ¿ä±¸ »çÇ×
¿µ¹®Ç¥Áظí Functional Requirements for Wireless Device Identification in WLAN
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â ¹«¼± ·£¿¡¼­ÀÇ MAC ÁÖ¼Ò À§Á¶ °ø°Ý ±â¹ÝÀÇ º¸¾È À§ÇùÀ» ºÐ¼®ÇÏ°í, ¹«¼± µð¹ÙÀ̽º»ó¿¡¼­ ³ªÅ¸³ª´Â µ¶Æ¯ÇÑ Æ¯Â¡À» ±â¹ÝÀ¸·Î ÇÏ´Â ¹«¼± µð¹ÙÀ̽º ½Äº° ±â´É¿¡ ´ëÇÑ ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard analyzes MAC spoofing-based security threats in WLAN and defines functional requirements for the wireless device identification that is a way to identify a wireless device by using distinctive characteristics exhibited by the device.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0231.pdf TTAK.KO-12.0231.pdf            

ÀÌÀü
¹«¼± ħÇØ ¹æÁö ½Ã½ºÅÛ°ú ¸ð¹ÙÀÏ µð¹ÙÀ̽º °ü¸® ½Ã½ºÅÛ °£ÀÇ Á¤º¸ °øÀ¯ ÇÁ·¹ÀÓ¿öÅ©
´ÙÀ½
½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· ħÇØ »ç°í¿¡ ´ëÇÑ º¸¾È Áöħ