Browse > Article
http://dx.doi.org/10.5762/KAIS.2010.11.10.3935

A Study on Network Reliability Analysis for Information Security  

Yu, Hyoung-Seok (Dept. of IT Applied System Engineering, Chonbuk National University)
Park, Hong-Keun (School of Electronic and Information Engineering, Kunsan National University)
Ryu, In-Ho (Dept. of IT Applied System Engineering, Chonbuk National University)
Kim, Hyoung-Jin (Dept. of IT Applied System Engineering, Chonbuk National University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.11, no.10, 2010 , pp. 3935-3941 More about this Journal
Abstract
With the advent of high-speed communications networks, many authentication and access control systems are being introduced to combat network security issues like system hacking. But the fact is that the security systems for protecting information used in these networks are themselves weak. In response to the mounting demands of existing users, there is a clear need for a new authentication system that provides both safety and reliability. This research presents an authentication method with excellent access authorization (explicit and implicit authentication) and safety performance, demonstrated through its use in online networks.
Keywords
Security Authentication Service; Explicit Authentication; Implicit Authentication; DHCP;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Eronen, Ed., T. Hiller, and G. Zorn, "Diameter Extensible Authentication Protocol(EAP) Application", RFC4072, August 2005.
2 이지은, "네트워크 서비스 인증체계 구축 방향 정립", 2005.
3 S. Kent, R. Atkinson, "Security Architecture for the Internet Protocol", RFC 1825, Jul. 1998.
4 D. Johnston and J. Walker, "Overview of IEEE 802.16 security," IEEE Security & Privacy, vol. 2, no. 3, pp. 40-88, May-June 2004.
5 R. Richardson, "2007 CSI Computer Crime and Security Survey," The 12th Annual report of computer security society, CSI, 2007.