Network Access Authentication

2012 ◽  
pp. 347-420
2021 ◽  
Author(s):  
Helen Cheung

The intent of this thesis research is to develop a concept/methodology to advance technologies for controls of network accesses to the industrial processes of safety/operation-critical and to contribute to the nuclear process control modernization with improved nuclear operation security and consequently increased nuclear safety and cost savings. This thesis is focused on the security-integrated nuclear process network-access controls for modernizing nuclear operations. This thesis research commenced with assessments of the current states of nuclear processes in the live nuclear generating stations and identified improvements on the current nuclear practices and security concerns of using the network-based intelligent features of modern process controls for nuclear operations. This thesis has created SNP - Security-integrated Nuclear Process, OBAC - Operation Based Access Control, NOAA - Nuclear Operation Access Authentication, CSM - Cost Savings Model, etc. as the fundamental developments for contributions to the nuclear operations modernization with improved operation security and subsequently increased nuclear safety and cost savings in daily nuclear operations. The SNP is to transform the current nuclear practices into network-based nuclear operations that include equipment performance monitoring, nuclear data processing, nuclear equipment control and maintenance. The OBAC is an operation-based access control built upon the core nuclear operations and facilitates the security and quality controls of network accesses to nuclear operations. The NOAA is to provide user security authentication for access to nuclear operation network, which is composed of APP for access pre-access authentication and AQP for access qualification authentication. The CSM is designed for evaluations of the SNP and associated designs in terms of cost savings opportunity. The feasibility and practicality of these new designs are illustrated in the thesis, by analytical and numerical methods. The significance of these new designs is tremendous, resulting in potentially significant cost savings in daily nuclear generation, in addition with increased nuclear operation network security and subsequently the nuclear safety that is priceless.


Sensors ◽  
2017 ◽  
Vol 17 (11) ◽  
pp. 2646 ◽  
Author(s):  
Dan Garcia-Carrillo ◽  
Rafael Marin-Lopez ◽  
Arunprabhu Kandasamy ◽  
Alexander Pelov

2021 ◽  
Author(s):  
Helen Cheung

The intent of this thesis research is to develop a concept/methodology to advance technologies for controls of network accesses to the industrial processes of safety/operation-critical and to contribute to the nuclear process control modernization with improved nuclear operation security and consequently increased nuclear safety and cost savings. This thesis is focused on the security-integrated nuclear process network-access controls for modernizing nuclear operations. This thesis research commenced with assessments of the current states of nuclear processes in the live nuclear generating stations and identified improvements on the current nuclear practices and security concerns of using the network-based intelligent features of modern process controls for nuclear operations. This thesis has created SNP - Security-integrated Nuclear Process, OBAC - Operation Based Access Control, NOAA - Nuclear Operation Access Authentication, CSM - Cost Savings Model, etc. as the fundamental developments for contributions to the nuclear operations modernization with improved operation security and subsequently increased nuclear safety and cost savings in daily nuclear operations. The SNP is to transform the current nuclear practices into network-based nuclear operations that include equipment performance monitoring, nuclear data processing, nuclear equipment control and maintenance. The OBAC is an operation-based access control built upon the core nuclear operations and facilitates the security and quality controls of network accesses to nuclear operations. The NOAA is to provide user security authentication for access to nuclear operation network, which is composed of APP for access pre-access authentication and AQP for access qualification authentication. The CSM is designed for evaluations of the SNP and associated designs in terms of cost savings opportunity. The feasibility and practicality of these new designs are illustrated in the thesis, by analytical and numerical methods. The significance of these new designs is tremendous, resulting in potentially significant cost savings in daily nuclear generation, in addition with increased nuclear operation network security and subsequently the nuclear safety that is priceless.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Dawei Li ◽  
Jia Yu ◽  
Xue Gao ◽  
Najla Al-Nabhan

Blockchain is an innovated and revolutionized technology, which has attracted wide attention from academia and industry. At present, blockchain has been widely used in certificate management and credential delivery in network access authentication. In a large-scale multidomain Internet of Things (IoT) environment, one of the important issues is cross-domain key sharing and secure data exchange between different IoT. In this paper, aiming at the multidomain authentication requirements of the IoT, this paper introduces the blockchain cross-chain technology into the cross-domain authentication process of the IoT and proposes an effective cross-domain authentication scheme of the IoT based on the improved PBFT algorithm. First, an architecture of blockchain-based cross-domain authentication is proposed. Then, the block data structure is designed in order to enhance the function of access authentication. Third, the authentication process is realized by intelligent contract. The authentication information is encrypted and distributed by a key sharing method to ensure the security of authentication data. Simulation results show that the proposed scheme has significant advantages in security and availability.


2014 ◽  
Vol 519-520 ◽  
pp. 236-240
Author(s):  
Fei Wang ◽  
Yu Wang ◽  
Yuan Tian

Currently, the generic WLAN authentication protocols have the problem of low security intensity, or the problem of only one-way identification. It cannot completely adapt to the wireless LAN access certification requirements, under the condition of high security. The article analyzes the disadvantage of WAPI protocol, and then puts forward a kind of improved WLAN access authentication mechanism. It implements the mutual authentication, privacy protection, and also it can resist man-in-the-middle attack and impersonation attack. It fulfills the requirement of wireless terminals security access. The effect on security and efficiency is analyzed.


Sign in / Sign up

Export Citation Format

Share Document