2016 12th IEEE International Symposium on Electronics and Telecommunications (ISETC) 2016
DOI: 10.1109/isetc.2016.7781061
|View full text |Cite
|
Sign up to set email alerts
|

Implementing an AAA-RADIUS solution based on legacy authentication protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Professional tools to overcome the problem of security and network bandwidth management in organizations have been widely marketed, but have hundreds of millions cost [7], [8], so it cannot be reached by newly built or developing organizations. The RADIUS server implementation on the wireless network is implemented to implement the client authentication protocol through three processes namely AAA (authentication, authorization, accounting to determine client access rights to the network) RADIUS server can also be integrated with SSO and LDAP as a legacy authentication protocol solution in simulating the provision IP address automatically to the client (which can be stored in a database) [9]- [11].…”
Section: Research Methods 21 Related Workmentioning
confidence: 99%
“…Professional tools to overcome the problem of security and network bandwidth management in organizations have been widely marketed, but have hundreds of millions cost [7], [8], so it cannot be reached by newly built or developing organizations. The RADIUS server implementation on the wireless network is implemented to implement the client authentication protocol through three processes namely AAA (authentication, authorization, accounting to determine client access rights to the network) RADIUS server can also be integrated with SSO and LDAP as a legacy authentication protocol solution in simulating the provision IP address automatically to the client (which can be stored in a database) [9]- [11].…”
Section: Research Methods 21 Related Workmentioning
confidence: 99%
“…Gabriel-CătălinCristescu et al [5] presented a solution related to the authentication, authorization, and accounting of the users intending to get access to the Internet through a secured network. The RADIUS protocol was used to encapsulate the packets of the PAP, CHAP, MSCHAPv1, and MSCHAPv2 legacy authentication protocols, while the MD4, MD5, salted MD5 and SHA-1 hashing algorithms were used to provide an enhanced security for the user passwords.…”
Section: Literature Surveymentioning
confidence: 99%