Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAK.KO-12.0231 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2013-12-18 | ÃÑ ÆäÀÌÁö | 30 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ¹«¼± ·£¿¡¼ ¹«¼± µð¹ÙÀ̽º ½Äº°À» À§ÇÑ ±â´É ¿ä±¸ »çÇ× | ||||||||||||||||
¿µ¹® Ç¥Áظí | Functional Requirements for Wireless Device Identification in WLAN | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» Ç¥ÁØ¿¡¼´Â ¹«¼± ·£¿¡¼ÀÇ MAC ÁÖ¼Ò À§Á¶ °ø°Ý ±â¹ÝÀÇ º¸¾È À§ÇùÀ» ºÐ¼®Çϰí, ¹«¼± µð¹ÙÀ̽º»ó¿¡¼ ³ªÅ¸³ª´Â µ¶Æ¯ÇÑ Æ¯Â¡À» ±â¹ÝÀ¸·Î ÇÏ´Â ¹«¼± µð¹ÙÀ̽º ½Äº° ±â´É¿¡ ´ëÇÑ ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | This standard analyzes MAC spoofing-based security threats in WLAN and defines functional requirements for the wireless device identification that is a way to identify a wireless device by using distinctive characteristics exhibited by the device. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|