scholarly journals Design and Analysis of Wireless Network with Wireless Distribution System using Multi-Factor Authentication-based User Authentication

2020 ◽  
Vol 2 (1) ◽  
pp. 17-24
Author(s):  
Muchamad Rusdan ◽  
Muhamad Sabar

Wireless networks are one of the best alternatives in building practical and flexible computer networks that have high mobility. Most of them use wireless networks to support existing cable networks, but on wireless networks, they still use cable media as a backbone of the access point, which supports communication users can access the internet and find information. The problem of using cables as backbone media can be a significant challenge in places that are difficult to reach by wires. Wireless networks provide convenience and convenience that is high enough to use. As long as they are in an area that is supported by a wireless network, users can access the internet at any time. To make the wireless network connected to the internet safe and easy to use, we can create a user authentication system based on Multi-Factor Authentication (MFA) that can be used to authenticate and authorize. In general, each user can use existing wireless network services by verifying users based on Wifi Protected Access 2 Pre-Shared Key (WPA2-PSK). The purpose of this research is to develop a wireless network that uses Multi-Factor Authentication (MFA) based user authentication to be able to connect to the wireless network to increase security and provide the use of existing wireless networks. The research method used in this study uses descriptive qualitative research methods, with data collection using literature study and observation techniques. After analysis and design, it can be concluded that user authentication is based on Multi-factor Authentication (MFA) in a safe and user-friendly manner that can determine the users who are allowed and not allowed to use wireless networks.

Author(s):  
Muchamad Rusdan

The purpose of this research is to create a wireless network design in Cijambe Village using WDS so that Cijambe Village can enjoy internet services through wireless networks, which can be used to find information, communication, and market products owned by village communities. A wireless network is one of the best alternatives in building a computer network that is practical and flexible and has high mobility. Most organizations use wireless networks to support existing cable networks, but in reality, the wireless network still uses Unshielded Twisted Pair (UTP) cable media as the backbone of Access Points (AP). Cijambe Village is a village located in Paseh District, Sumedang Regency. Cijambe village is divided into two hamlets, namely Cijambe Hamlet and Parugpug Hamlet. Cijambe village has an area of 357 hectares. The research method used in this study is a qualitative descriptive research method. The steps taken in this research are analysis and design. the conclusion is that wireless network design for digital villages using Wireless Distribution System (WDS) has a better degree of flexibility than the backbone that uses Unshielded Twisted Pair (UTP) cable. Radio wave signals from 19 AP units can reach the entire area of Cijambe Village which has an area of 357 hectares and is divided into 2 hamlets namely, Hamlet Cijambe and Parugpug Hamlet. The design made has thought of a standard level of security with routers and firewalls.


2020 ◽  
Vol 12 (1) ◽  
pp. 49
Author(s):  
Fandi Ali Mustika ◽  
Febryo Ponco Sulistyo ◽  
Chairul Anhar Tanof

Abstract The rapid development of Internet networks in offices, industries, homes, and universities, transforming the conventional system into modern, especially with the Internet. Therefore, it is very important to use a good authentication method to avoid unauthorized user access. Wireless network without authentication can harm users in their activities using Internet access. One of the most effective ways for secure wireless network authentication with Captive portals with Radius authentication method. Captive portals are web pages that control Hyper Text Transfer Protocol (HTTP) browser access to the Internet. The user who is in authentication is their MAC address. Radius is a service that authenticates and authorizes users to network and network infrastructure. This paper will discuss how to use RADIUS authentication with captive portals to manage user authentication on wireless networks. Built-in security mechanism in Wifi 802.11.x equipment to control who can associate to an Access Point (AP). The use of captive portal so that the AP works without configuration settings, so it does not burden the work of the AP itself.Keywords: Captive Portal, Radius, Authentication, Wireless Network Abstrak Perkembangan jaringan internet yang semakin pesat di kantor, industri, rumah, dan universitas, mengubah sistem konvensional menjadi modern, terutama dengan adanya internet. Oleh karena itu, sangat penting untuk menggunakan metode otentikasi yang baik untuk menghindari akses pengguna yang tidak sah. Wireless network tanpa otentikasi dapat membahayakan pengguna dalam aktivitas mereka dalam menggunakan akses internet. Salah satu cara yang paling efektif untuk otentikasi wireless network yang aman dengan Captive Portal dengan metode otentikasi Radius. Captive portal adalah halaman web yang mengkontrol Hyper Text Transfer Protocol (HTTP) akses browser ke internet. Pengguna yang di otentikasi adalah MAC address mereka. Radius adalah layanan yang mengotentikasi dan mengotorisasi pengguna ke jaringan dan infrastruktur jaringan. Mekanisme keamanan built-in di peralatan Wifi 802.11.x untuk mengontrol siapa saja yang dapat berasosiasi ke Access Point (AP). Penggunaan captive portal agar AP bekerja tanpa seting konfigurasi, sehingga tidak membebani kerja dari AP itu sendiri.Kata Kunci: Captive Portal, Radius, Otentikasi, Wireless Network


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


2016 ◽  
pp. 749-777
Author(s):  
Sulata Mitra

The next generation wireless networks will be heterogeneous wireless environments because of the coexistence of a large variety of wireless access technologies. The different networks have different architectures and protocols. So it is difficult for a user to roam from one radio system to another which can be solved by using the Internet protocol as a common interconnection protocol as it needs no assumptions about the characteristics of the underlying technologies. An all-IP wireless network is an IP-based wireless access system that makes wireless networks more robust, scalable, and cost effective. The nodes in such a network are mobile nodes as they change their location and point of attachment to the Internet frequently. The mobility management is an important research issue in an all-IP wireless network for providing seamless roaming facility to mobile nodes from one wireless system to another. The dynamic resource management is also required in this environment to ensure sufficient resource in the selected route for transmission or reception of the data packets during seamless roaming of the mobile nodes. This chapter is aimed at the researchers and the policy makers making them aware of the different means of mobility management and resource management for mobile nodes in all-IP wireless networks.


Author(s):  
Isaac Chin Eian ◽  
Ka Yong Lim ◽  
Majesty Xiao Li Yeap ◽  
Hui Qi Yeo ◽  
Fatima Z

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.


Author(s):  
Sulata Mitra

The next generation wireless networks will be heterogeneous wireless environments because of the coexistence of a large variety of wireless access technologies. The different networks have different architectures and protocols. So it is difficult for a user to roam from one radio system to another which can be solved by using the Internet protocol as a common interconnection protocol as it needs no assumptions about the characteristics of the underlying technologies. An all-IP wireless network is an IP-based wireless access system that makes wireless networks more robust, scalable, and cost effective. The nodes in such a network are mobile nodes as they change their location and point of attachment to the Internet frequently. The mobility management is an important research issue in an all-IP wireless network for providing seamless roaming facility to mobile nodes from one wireless system to another. The dynamic resource management is also required in this environment to ensure sufficient resource in the selected route for transmission or reception of the data packets during seamless roaming of the mobile nodes. This chapter is aimed at the researchers and the policy makers making them aware of the different means of mobility management and resource management for mobile nodes in all-IP wireless networks.


2018 ◽  
Vol 17 ◽  
pp. 01013
Author(s):  
Dapeng Huangfu ◽  
Xiaoping Tian ◽  
Xingjian Wang ◽  
Ping Chen

With the rapid development of Internet +, the dependence on wireless networks and wireless terminals are increasing. Campus wireless network has become the main network of teachers and students in campus on the internet. As there are uneven clients and a wide variety of intelligent terminals now. Simplified authentication and network security become the most urgent problem for wireless network. This paper used the Portal + Mac authentication method to realize the non-cognitive authentication of teachers and students on basis of the analysis of the advantages and disadvantages of mainstream authentication of campus wireless network, such as 802.1X authentication, Portal authentication, Mac authentication and DHCP authentication. Teachers and students only need portal certification at the first time, then surf the internet with non-perceived authentication at the second time and later. This method increases network security, and is better to meet the needs of teachers and students.


2015 ◽  
Vol 764-765 ◽  
pp. 900-904
Author(s):  
Yu Hsiang Hsneh ◽  
Fu Hau Hsu ◽  
Shih Jen Chen ◽  
Yao Hsin Chen ◽  
Yan Ling Hwang ◽  
...  

An evil twin is a kind of rogue Wi-Fi access point (AP) which has the same SSID name to the legitimate one and is set up by an adversary. The user who associates to the evil twin, adversary may eaves-drops sensitive data on wireless communications to the Internet. Most of existing detection solutions are administrator-based, which is used by wireless network administrator to verify whether a given AP is in an authorized list or not. Such administrator-based solutions are limited, hardly maintained, and difficult to protect users timely when the attack is launched. Hence, we propose a client-based detection by operating the wireless network interface controller (WNIC) in monitor mode and capturing the Internet packets. Through analyzing the captured packets, client users can easily and precisely detect the evil twin attack even in a complicated AP scenario as well as avoid any threat arisen from connecting to an AP. Our method does not need to know any authorized AP list, and does not rely on data training or machine learning technique of target wireless network. Finally, we implemented a detecting system on Windows 7, which is widely used nowadays.


2018 ◽  
Vol 1 (1) ◽  
pp. 38
Author(s):  
Mohammad Taufan Asri Zaen ◽  
Falah Husni

Currently the hotspot network used by students in STMIK Lombok uses Basic Service Set topology (BSS), therefore different Service Set Identifier (SSID) in each Access Point (AP) causes the mobility and reliability of the hotspot network to decrease. To overcome this problem can be applied hotspot system with Extended Service Set topology (ESS) that uses more than one AP and integrate all AP into a single wireless network using Internal Wireless Roaming so that client mobility is not disturbed when moving locations in the campus area without having to reconfigured. The signal coverage test of roaming network that has been done in STMIK Lombok using Wireless Distribution System (WDS) has not reached all campus area but can be overcome by adding AP to increase coverage area. Roaming that runs between APs can work but requires more time in the process of moving.


Author(s):  
Alya Hannah Ahmad Kamal ◽  
Caryn Chuah Yi Yen ◽  
Pang Sze Ling ◽  
Fatima -tuz-Zahra

The rapid growth of network services, Internet of Things devices and online users on the Internet have led to an increase in the amount of data transmitted daily. As more and more information is stored and transmitted on the Internet, cybercriminals are trying to gain access to the information to achieve their goals, whether it is to sell it on the dark web or for other malicious intent. Through thorough literature study relating to the causes and issues that are brought from the security and privacy segment of wireless networks, it is observed that there are various factors that can cause the networks to be an insecure; especially factors that revolve around cybercriminals with their growing expertise and the lack of preparation and efforts to combat them by relevant bodies. The aim of this paper is to showcase major and frequent security as well as privacy issues in wireless networks along with specialized solutions that can assist the related organizations or the public to fathom how great of an impact these challenges can bring if every related stakeholder took a step in reducing them. Through this paper it is discovered that there are many ways these challenges can be mitigated, however, the lack of implementation of privacy and security solutions is still largely present due to the absence of practical application of these solutions by responsible parties in real world scenarios.


Sign in / Sign up

Export Citation Format

Share Document