authentication management
Recently Published Documents


TOTAL DOCUMENTS

27
(FIVE YEARS 4)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Fathima T ◽  
Vennila S M

IEEE 802 is used in LAN networks that expose or provide sensitive data to complex applications or services. These are protocols for accessing, managing and controlling access to network-based services and applications in general. Port-controlled network access controls network access and prevents the transmission and reception of nameless or unauthorized persons, leading to network interruption, service theft and data loss. This paper introduces a new approach to investigate whether a data packets in wired networks transferred to a management device is authenticated packet. The data packets are sent to the SDN from RAR and share the information associated with each packet with a limited rate for the access management and are received by the RFC. Here it detects whether the data packet arrived is accepted or restricted. The speed at the authentication start packet is restricted to manage the number of terminals that enter later authentication, and it avoids avalanche impact of wireless authentication which may cause faults to lots of terminals which enter later authentication at the same time.


Author(s):  
Tsutomu Shimada ◽  
Sachie Osada ◽  
Yusuke Hara ◽  
Masayoshi Nobori ◽  
Kinya Asahino ◽  
...  

Author(s):  
Asayel AlAbdullatif ◽  
Kholood AlAjaji ◽  
Norah Saad Al-Serhani ◽  
Rachid Zagrouba ◽  
Maryam AlDossary

2018 ◽  
Vol 101 (3) ◽  
pp. 1445-1455 ◽  
Author(s):  
Guoliang Liu ◽  
Huichuan Zhang ◽  
Fanyue Kong ◽  
Lei Zhang

2017 ◽  
Author(s):  
Fufang Li ◽  
Lina Yuan ◽  
Lingxi Peng ◽  
Wenbin Cheng ◽  
Yuanyong Feng

Sign in / Sign up

Export Citation Format

Share Document