z-logo
open-access-imgOpen Access
Implementation Of Authentication Systems On Hotspot Network Users To Improve Computer Network Security
Author(s) -
Ellen Dolan,
Riya Widayanti
Publication year - 2022
Publication title -
international journal of cyber and it service management/international journal of cyber and it service management
Language(s) - English
Resource type - Journals
eISSN - 2808-554X
pISSN - 2797-1325
DOI - 10.34306/ijcitsm.v2i1.93
Subject(s) - computer science , computer network , wireless network , password , authentication protocol , authentication server , network access control , computer security , hotspot (geology) , network security , world wide web , wireless , telecommunications , operating system , cloud computing security , cloud computing , geophysics , geology
Because of the growing number of apps that use client servers, both desktop and WEB applications, each user must learn a large number of user ids and passwords, because each application requires authentication in order to use it for security reasons. Furthermore, the development of network media, both wired and wireless, is accelerating. In the scenarios stated above, RADIUS (Remote Authentication Dial-In User Service) technology is required since the RADIUS approach allows a user to utilize a single user id to access several applications, both desktop and web-based. The RADIUS protocol may be used with both wired and wireless media.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here