Implementation of Authentication Systems on Hotspot Network Users to Improve Computer Network Security
DOI:
https://doi.org/10.34306/ijcitsm.v2i1.93Keywords:
wireless, authentication, database, server, client.Abstract
Because of the growing number of apps that use client servers, both desktop and WEB applications, each user must learn a large number of user ids and passwords, because each application requires authentication in order to use it for security reasons. Furthermore, the development of network media, both wired and wireless, is accelerating. In the scenarios stated above, RADIUS (Remote Authentication Dial-In User Service) technology is required since the RADIUS approach allows a user to utilize a single user id to access several applications, both desktop and web-based. The RADIUS protocol may be used with both wired and wireless media.
References
Y. Chandra, N. A.-J. I. System, and undefined 2021, “Wireless Network Security Using WEP (Wired Equivalent Privacy) Method With RC4 Stream Cipher Encryption,” journal.teknikunkris.ac.id, 2021, Accessed: Mar. 02, 2022. [Online]. Available: http://journal.teknikunkris.ac.id/index.php/jis/article/download/139/119
D. Cahyadi, A. Faturahman, H. Haryani, E. Dolan, and S. millah, “BCS : Blockchain Smart Curriculum System for Verification Student Accreditation,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 65–83, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/20
G. D.-R. energy and undefined 2020, “A survey on smart grid technologies and applications,” Elsevier, Accessed: Mar. 02, 2022. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0960148119312790
D. Immaniar, N. Azizah, D. Supriyanti, N. Septiani, and M. Hardini, “PoTS: Proof of Tunnel Signature for Certificate Based on Blockchain Technology,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 101–114, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/28
T. Ayuninggati, N. Lutfiani, and S. Millah, “CRM-Based E-Business Design (Customer Relationship Management) Case Study : Shoe Washing Service Company S-Neat-Kers,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 216–225, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/58
G. Maulani, G. Gunawan, L. Leli, E. Ayu Nabila, and W. Yestina Sari, “Digital Certificate Authority with Blockchain Cybersecurity in Education,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 136–150, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/40
T. Nurhaeni, N. Lutfiani, A. Singh, W. Febriani, and M. Hardini, “The Value of Technological Developments Based on An Islamic Perspective,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 1–13, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/4
B. Rawat and S. Purnama, “MySQL Database Management System (DBMS) On FTP Site LAPAN Bandung,” International Journal of Cyber and IT Service Management, vol. 1, no. 2, pp. 173–179, 2021.
P. Edastama, A. Dudhat, and G. Maulani, “Use of Data Warehouse and Data Mining for Academic Data : A Case Study at a National University,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 206–215, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/55
P. Edastama, A. S. Bist, and A. Prambudi, “Implementation Of Data Mining On Glasses Sales Using The Apriori Algorithm,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 159–172, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/46
Y. Durachman, A. Sean Bein, E. Purnama Harahap, T. Ramadhan, and F. Putri Oganda, “Technological and Islamic environments: Selection from Literature Review Resources,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 37–47, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/12
D. Apriani, A. Williams, U. Rahardja, A. Khoirunisa, and S. Avionita, “The Use of Science Technology In Islamic Practices and Rules In The Past Now and The Future,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 48–64, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/16
I. Y. Ruhiawati, A. P. Candra, and S. N. Sari, “Design and Build a Multimedia System for Indonesian Religious Activities Based on Android,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 233–239, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/64
M. R. Anwar, R. Panjaitan, and R. Supriati, “Implementation Of Database Auditing By Synchronization DBMS,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 197–205, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/53
W. Setyowati, R. Widayanti, and D. Supriyanti, “Implementation Of E-Business Information System In Indonesia : Prospects And Challenges,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 180–188, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/49
S. Watini, T. Nurhaeni, and L. Meria, “Development Of Village Office Service Models To Community Based On Mobile Computing,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 189–196, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/51
A. Alwiyah, S. Husin, P. Padeli, M. Anggaraeni, and S. Sulistiawati, “Alignment of Science and Technology With Islamic Principles Using Quantum Theory,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 115–120, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/32
T. Ramadhan, Q. Aini, S. Santoso, A. Badrianto, and R. Supriati, “Analysis of the potential context of Blockchain on the usability of Gamification with Game-Based Learning,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 84–100, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/24
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Ellen Dolan, Riya Widayanti.
This work is licensed under a Creative Commons Attribution 4.0 International License.