scholarly journals Research and Mass Deployment of Non-cognitive Authentication Strategy Based on Campus Wireless Network

2018 ◽  
Vol 17 ◽  
pp. 01013
Author(s):  
Dapeng Huangfu ◽  
Xiaoping Tian ◽  
Xingjian Wang ◽  
Ping Chen

With the rapid development of Internet +, the dependence on wireless networks and wireless terminals are increasing. Campus wireless network has become the main network of teachers and students in campus on the internet. As there are uneven clients and a wide variety of intelligent terminals now. Simplified authentication and network security become the most urgent problem for wireless network. This paper used the Portal + Mac authentication method to realize the non-cognitive authentication of teachers and students on basis of the analysis of the advantages and disadvantages of mainstream authentication of campus wireless network, such as 802.1X authentication, Portal authentication, Mac authentication and DHCP authentication. Teachers and students only need portal certification at the first time, then surf the internet with non-perceived authentication at the second time and later. This method increases network security, and is better to meet the needs of teachers and students.

Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


Author(s):  
Firmansyah Firmansyah ◽  
Rachmat Adi Purnama ◽  
Rachmawati Darma Astuti

The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login


Author(s):  
Ibraim Didmanidze ◽  
Zebur Beridze ◽  
Vladimir Zaslavski

In the people's lives wireless networks play a big role. It is necessary to understand the basic concept of wireless networks, to consider the security issues related to them, and then observe how they work and what benefits they can bring in different cases. In this regard the given research paper presents the fundamental principles of security as well as related open questions. It reviews the security issues of the wireless networks. Security of protocols of wireless network routing has become an urgent necessity to stimulate the network launching and expand the area of its usage. Therefore, the presented research paper proposes and defines different solutions and concepts for security.  


2016 ◽  
pp. 749-777
Author(s):  
Sulata Mitra

The next generation wireless networks will be heterogeneous wireless environments because of the coexistence of a large variety of wireless access technologies. The different networks have different architectures and protocols. So it is difficult for a user to roam from one radio system to another which can be solved by using the Internet protocol as a common interconnection protocol as it needs no assumptions about the characteristics of the underlying technologies. An all-IP wireless network is an IP-based wireless access system that makes wireless networks more robust, scalable, and cost effective. The nodes in such a network are mobile nodes as they change their location and point of attachment to the Internet frequently. The mobility management is an important research issue in an all-IP wireless network for providing seamless roaming facility to mobile nodes from one wireless system to another. The dynamic resource management is also required in this environment to ensure sufficient resource in the selected route for transmission or reception of the data packets during seamless roaming of the mobile nodes. This chapter is aimed at the researchers and the policy makers making them aware of the different means of mobility management and resource management for mobile nodes in all-IP wireless networks.


2014 ◽  
Vol 602-605 ◽  
pp. 2134-2137
Author(s):  
De Feng Chen ◽  
Wen Yan Zhang ◽  
Zhi Bin Yang

Currently, information security inspection can only be conducted via network scan using a laptop, which results in a low-efficient one-by-one check, and moreover lacks the ability to locate wireless networks and not to mention technical measures to discover hidden networks. With respect to the regulations of a power supply enterprise regarding wireless network security, combined with the operation and maintenance comprehensive supervision system (IMS), and the information extranet security monitoring system (ISS), a cascading wireless network security inspection platform is studied and implemented. This paper describes the wireless network encryption technology, and details the deployment pattern and the work flow, etc. about the wireless network security inspection platform. Experiments show that the platform provides support for the information security supervision work of wireless networks and can effectively safeguard the security of wireless networks in a power enterprise.


2014 ◽  
Vol 599-601 ◽  
pp. 2036-2039
Author(s):  
Le Hui Huang ◽  
Bin Gui

The rapid development of the internet has deeply changed the way of human life and learning. As an important learning concept being promoting in domestic and foreign education in recent years, the mode of research learning is changing with the development of internet. The paper summarizes the basis connotation of research learning, the advantages and disadvantages of implementing research learning by the internet, and matters needing to pay attention to in research learning under the network environment.


E-methodology ◽  
2021 ◽  
Vol 7 (7) ◽  
pp. 9-16
Author(s):  
KINGA FRĄCZKOWSKA

Aim. A theoretical review of the opportunities and functions of the application enabling the creation of internet surveys. Assessment of their use in accordance with own opinion and the analysis of the literature on the subject.Methods. Analysis of the literature on the subject and a summary of the description of the survey conducted on the basis of a questionnaire examining the interesting phenomenon of e-methodology and an opinion on distance learning. The authors analysed the advantages and disadvantages of the tools used in online research. The aforementioned experiences of the researchers refer to the experience gained during research on e-methodology.Results and conclusion. The interest in this medium as a tool for social and psychological research has been growing rapidly in the last ten years. The very rapid development of technology that has taken place during the COVID-19 pandemic allowed us to easilyconduct a research survey using the network, which can easily replace any labour-intensive data collection through inquiry. In addition, many different tools and techniques have been created that use the so-called “Global spider web” in conducting my own research. Theresearcher abandons direct contact with the respondent and devotes himself to the analysis of the phenomenon that interests him by analysing the given Internet environment, social groups that express themselves on a given topic or share their work on specifi c problems. However, the global network is not only a chance for good, innovative approach to research, but also threats and related difficulties. One of the most important weaknesses of the network is the fact that we can never be sure who is on the other end of the computer.Cognitive value. Presentation of new ways of conducting scientific research via the network, presenting my own analysis of the advantages and disadvantages of the e-methodology phenomenon. Analysing the phenomenon of internet methodology, welearn that the tendency to participate in internet research is increasing. However, motivation to participate in internet research is not always sufficient, as mentioned by many researchers. There are many ways to infl uence the attractiveness of the research and the motivation to participate in the research. Thanks to this article, we also learn that it is still necessary to conduct further methodological research on increasing the effectiveness of Internet research and minimising errors associated with it. The issues presented in this article reflect the current methodological knowledge. We can predict that as the Internet grows and new technical opportunities emerge - such as video-enabled applications, among others - new methodological issues will arise that may be of interest to researchers.


Author(s):  
Isaac Chin Eian ◽  
Ka Yong Lim ◽  
Majesty Xiao Li Yeap ◽  
Hui Qi Yeo ◽  
Fatima Z

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.


Author(s):  
Sulata Mitra

The next generation wireless networks will be heterogeneous wireless environments because of the coexistence of a large variety of wireless access technologies. The different networks have different architectures and protocols. So it is difficult for a user to roam from one radio system to another which can be solved by using the Internet protocol as a common interconnection protocol as it needs no assumptions about the characteristics of the underlying technologies. An all-IP wireless network is an IP-based wireless access system that makes wireless networks more robust, scalable, and cost effective. The nodes in such a network are mobile nodes as they change their location and point of attachment to the Internet frequently. The mobility management is an important research issue in an all-IP wireless network for providing seamless roaming facility to mobile nodes from one wireless system to another. The dynamic resource management is also required in this environment to ensure sufficient resource in the selected route for transmission or reception of the data packets during seamless roaming of the mobile nodes. This chapter is aimed at the researchers and the policy makers making them aware of the different means of mobility management and resource management for mobile nodes in all-IP wireless networks.


Author(s):  
I. Dudás

We have entered the new millennium with two great inventions, the Internet and mobile telecommunication, and a remarkable trend of network evolution toward convergence of these two achievements. It is an evident step to combine the advantages of the Internet and the mobile communication methods together in addition to converge the voice and data into a common packet-based and heterogeneous network infrastructure. To provide interworking, the future systems have to be based on a universal and widespread network protocol, such as Internet protocol (IP) which is capable of connecting the various wired and wireless networks (Macker, Park, & Corson, 2001).However, the current version of IP has problems in mobile wireless networks; the address range is limited, IPv4 is not suitable to efficiently manage mobility, support real-time services, security, and other enhanced features. The next version, IPv6 fixes the problems and also adds many improvements to IPv4, such as extended address space, routing, quality of service, security (IPSec), network autoconfiguration and integrated mobility support (Mobile IPv6).Today’s IP communication is mainly based on unicast (one-to-one) delivery mode. However it is not the only method in use: other delivery possibilities, such as broadcast (one-to-all), multicast (one-to-many) and anycast (one-to-one-of-many) are available. Partridge, Mendez, and Milliken (1993) proposed the host anycasting service for the first time in RFC 1546. The basic idea behind the anycast networking paradigm is to separate the service identifier from the physical host, and enable the service to act as a logical entity of the network. This idea of anycasting can be achieved in different layers (e.g., network and application layers) and they have both strengths and weaknesses as well. We focus on network-layer anycasting in this article, where a node sends a packet to an anycast address and the network will deliver the packet to at least one, and preferably only one of the competent hosts. This approach makes anycasting a kind of group communication in that a group of hosts are specified for a service represented by an anycast address and underlying routing algorithms are supposed to find out the appropriate destination for an anycast destined packet.


Sign in / Sign up

Export Citation Format

Share Document