Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0231 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2013-12-18 ÃÑÆäÀÌÁö 30
ÇѱÛÇ¥ÁØ¸í ¹«¼± ·£¿¡¼­ ¹«¼± µð¹ÙÀ̽º ½Äº°À» À§ÇÑ ±â´É ¿ä±¸ »çÇ×
¿µ¹®Ç¥Áظí Functional Requirements for Wireless Device Identification in WLAN
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â ¹«¼± ·£¿¡¼­ÀÇ MAC ÁÖ¼Ò À§Á¶ °ø°Ý ±â¹ÝÀÇ º¸¾È À§ÇùÀ» ºÐ¼®ÇÏ°í, ¹«¼± µð¹ÙÀ̽º»ó¿¡¼­ ³ªÅ¸³ª´Â µ¶Æ¯ÇÑ Æ¯Â¡À» ±â¹ÝÀ¸·Î ÇÏ´Â ¹«¼± µð¹ÙÀ̽º ½Äº° ±â´É¿¡ ´ëÇÑ ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard analyzes MAC spoofing-based security threats in WLAN and defines functional requirements for the wireless device identification that is a way to identify a wireless device by using distinctive characteristics exhibited by the device.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0231.pdf TTAK.KO-12.0231.pdf            

ÀÌÀü
´Ùº¯¼ö ÀÌÂ÷½Ä ±â¹Ý ¾çÀÚ³»¼º¾ÏÈ£ – Á¦2ºÎ: HiMQ, ºÎ°¡Çü ÀüÀÚ¼­¸í ¾Ë°í¸®Áò
´ÙÀ½
³×Æ®¿öÅ© ±â´É °¡»óÈ­(NFV): ³×Æ®¿öÅ© ¼­ºñ½ºÀÇ Àå¾Ö ¹× ¼º´É °ü¸®¸¦ À§ÇÑ »óÈ£¿î¿ë¼º ½ÃÇè ÀýÂ÷