期刊名称:Journal of Theoretical and Applied Information Technology
印刷版ISSN:1992-8645
电子版ISSN:1817-3195
出版年度:2018
卷号:96
期号:6
出版社:Journal of Theoretical and Applied
摘要:Recently due to electronic weight lightening and miniaturization of devices, dissemination of devices such as smartphone is expanding abruptly. Concurrently with the convenience in carrying services using smartphone are increasing abruptly, leading us to many variations in life due to IOT environment realized. Especially as BYOD (Bring Your Own Device) ubiquitous environment is briskly realized, the business focused on use of internet is becoming the general trend in human living. Most of the businesses at government institutions, corporate or research laboratory, general households, are performed through network service. However, dependence on network is so high that any problem at network may cause paralysis of all businesses. Also operator maintaining the network requires much time and effort to resolve the problem of failure. Especially in case of any failure occurred in relation to security, the system to grasp the information comprising MAC, IP, access time, user etc in prompt and intuitive way is lacking, consuming much time in resolving problems. Recently as the IEEE 802.1x based wireless network expands, various services being provided. However, in the situation where many attacks through wireless network are occurring, this thesis proposes the authentication system that resolves the simple, repetitive problems which may occur between network user and the person in charge of network maintenance and can expedite user authentication, through user authentication based network design that can manage the authentication of dispersed network in centralized and flexible manner. Through the proposed system, threat to security would minimized and the user and network managers are anticipated to break from the simple, repetitive duties on internet service and management. Future studies shall be directed to the IP back tracking that can respond positively to the judgment and classification of wired-wireless traffic, and to the threat to security.