International Journal of Computer Networks and Communications Security

Volume 7, Issue 11, November 2018

 

 

Wireless Network Security Information System on Banking Company with Radius Server Using Authentication, Authorization, Accounting (AAA)
 

Wireless Network Security Information System on Banking Company with Radius Server Using Authentication, Authorization, Accounting (AAA)

Pages: 255-259 (5) | [Full Text] PDF (581 KB)
J E Setiawan
Business Information System, Gunadarma University, Jakarta Indonesia

Abstract -
BNI Coporate University (BNV) play an important role inimproving the quality of employees in terms of learning.Therefore, the BNV continues to develop digital learning methods,so that the employee can do the expected learning whenever andwherever. The WLAN network connection is managed entirelyby the Division of Management Information systems (MIS).There are constraints in the number of users who are not identifiedand the use of uncontrolled bandwidth on the network WLAN.Currently the WLAN network security applied by BNV usesencryption methods i.e. WEP (Wired Equivalent Privacy). WEPsecurity system on a single keyword to all users of the WLANencryption are used together. WLAN network security method isstill not able to handle the number of WLAN users not entitled tothat cause disruption of the available bandwidth capacity.Therefore required a network security method that can identifyand authenticate the user using the WLAN. Then implemented byinformation system authorization networks WLAN by using themethod of Authentication, Authorization and Accounting (AAA).By using the information system Authorization Networks WLANby using the method of Authentication, Authorization AndAccounting (AAA) bandwidth usage can fit to their use andincreased network security..
 
Index Terms - Information System, Website, AAA, WLAN, Network, Security

Citation - J E Setiawan. "Wireless Network Security Information System on Banking Company with Radius Server Using Authentication, Authorization, Accounting (AAA)." International Journal of Computer Science and Software Engineering 7, no. 11 (2018): 255-259.

Trust in Cloud Computing: Concepts, Issues, and Challenges
 

Trust in Cloud Computing: Concepts, Issues, and Challenges

Pages: 260-263 (4) | [Full Text] PDF (321 KB)
F Babtain, A Karra
Faculty of Computer Science and Engineering, Taibah University, Madinah, Kingdom of Saudi Arabia

Abstract -
Cloud Computing is emerging today as an infrastructure that removes the need for preserve expensive computing hardware. Cloud Computing is a new model to enable convenient and on-demand access to the grouping of configurable computing resources. Cloud Computing is a set of IT services that are provided to a client through a network and with the capability to scale up or down their service requirements. Generally, Cloud Computing services could be delivered by a third party supplier who has the infrastructure. Trust is one of the essential issues, which constraints the growth of cloud. Trust in the Cloud Computing is a critical issue and it is one of the most challenging issues in the cloud. Therefore, this research aims to define the trust, issues, and challenges in Cloud Computing.
 
Index Terms - Trust, Cloud Computing, CloudX, VM protection

Citation - F Babtain, A Karra. "Trust in Cloud Computing: Concepts, Issues, and Challenges." International Journal of Computer Science and Software Engineering 7, no. 11 (2018): 260-263.

Influencer Detection of Indonesia Citizens Opinion toward Chemical Castrated Punishment for Perpetrators of Pedophile Using Social Network Analysis
 

Influencer Detection of Indonesia Citizens Opinion toward Chemical Castrated Punishment for Perpetrators of Pedophile Using Social Network Analysis

Pages: 264-269 (6) | [Full Text] PDF (467 KB)
A. Talakua, E. Sediyono, I. Sembiring
University Christian Satya Wacana, Salatiga, Central Java, Indonesia

Abstract -
Social media is now capable of being a platform that often used to dispense various aspirations and creative ideas. Social media is also used as a place for discussions of the problem that is going on and makes it viral. This research will discuss about how to determine social media users that very central or key actor in the role of making the problem to be viral by using Social Network Analyst and Sentiment Analyst Approach to see the trait of influencer itself. The research leading to pedophile case with the data in the last two years produced one influencer of 500-twitter status with value degree of 0,311 and sentiment positive influence 84%, negative 15%.
 
Index Terms - Social Network Analyst, Influencer, Hashtag, Kebiri Kimia, Pedofilia

Citation - A. Talakua, E. Sediyono, I. Sembiring. "Influencer Detection of Indonesia Citizens Opinion toward Chemical Castrated Punishment for Perpetrators of Pedophile Using Social Network Analysis." International Journal of Computer Science and Software Engineering 7, no. 11 (2018): 264-269.

Attacking A PUF Based Mutual Authentication Protocol Designed For Internet of Things
 

Attacking A PUF Based Mutual Authentication Protocol Designed For Internet of Things

Pages: 270-274 (5) | [Full Text] PDF (775 KB)
MH Ozcanhan and S Utku
Computer Engineering, Dokuz Eylul Universitesi, Faculty of Engineering, Izmir, 35390, Turkiye

Abstract -
The security of the message exchanges among Internet of Things (IoT) devices is a big concern, in the field of information security and privacy. Due to the limited resources of IoT devices and their unsecure environments, strong authentication protocols are needed for the machine to machine (m2m) conversations. The physically unclonable functions (PUFs) inherent in the integrated circuits of the IoT devices are seen as an answer, for the security and privacy of the m2m communication. Although PUFs have strong advantages, the authentication protocols can show weaknesses, if not well-designed. In present work a mutual authentication protocol proposed for IoT devices is analyzed. It is demonstrated that with the same attack model of the authors, multiple attacks can be launched on the proposed protocol. A recommendation is also made for providing stronger security to the proposed protocol.
 
Index Terms - Authentication, Disclosure Attack, Internet of Things, Machine to Machine, Security

Citation - MH Ozcanhan and S Utku. "Attacking A PUF Based Mutual Authentication Protocol Designed For Internet of Things." International Journal of Computer Science and Software Engineering 7, no. 11 (2018): 270-274.