5 research outputs found
ANALISA IMPLEMENTASI VoIP BERBASIS SIP PADA JARINGAN WIRELESS LAN DENGAN KEMAMPUAN AUTO AUTHENTICATION SERVICE
Dalam komunikasi layanan wireless LAN, autentikasi merupakan hal biasa yang sering kita temui. Autentikasi digunakan untuk membatasi akses hanya kepada pelanggan yang terdaftar. Begitu pula dengan layanan komunikasi VoIP yang juga membutuhkan autentikasi sebelum kita dapat menggunakan layanan tersebut.
Pada tugas akhir ini dilakukan pengujian proses auto autentikasi voip. Proses auto autentikasi pada penelitian ini melibatkan server RADIUS sebagai server autentikasi EAP-SIM dan server Asterisk sebagai server VoIP. Agar autentikasi pada RADIUS dapat digunakan secara otomatis sebagai autentikasi pada Asterisk maka baik RADIUS dan Asterisk harus terhubung dengan mysql. Asterisk realtime merupakan metode baru dari Asterisk yang dapat digunakan agar semua data autentikasi disimpan ke dalam tabel database. Dengan menggunakan Trigger SQL pada tabel RADIUS maka setiap perubahan yang terjadi pada tabel RADIUS akan tersalin secara otomatis ke tabel Asterisk.
Hasil dari pengujian ini didapat bahwa rata-rata lama waktu proses autentikasi di sisi server voip adalah 1,614 ms. Dan rata-rata waktu yang dibutuhkan oleh supplicant agar terhubung ke jaringan melalui autentikasi EAP-SIM sampai dengan terhubung ke voip server adalah 0.760699 detik.
Kata kunci: EAP-SIM, Challenge-response, Supplicant, RADIUS, Asteris
Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms
Recommended from our members
Traffic engineering multi-layer optimization for wireless mesh network transmission a campus network routing protocol transmission performance inhancement
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel UniversityThe wireless mesh network is a potential network for the future due to its excellent inherent characteristic for dynamic self-healing, self-configuration and self-organization. It also has the advantage of easy interoperability networking and the ability to form multi-linked ad-hoc networks. It has a decentralized topology, is cheap and highly scalable. Furthermore, its ease in deployment and easy maintenance are other inherent networking qualities. These aforementioned qualities of the wireless mesh network bring advantages to transmission capability of heterogeneous networks. However, transmissions in wireless mesh network create comparative performance based challenges such as congestion, load-balancing, scalability over increasing networks and coverage capacity. Consequently, these challenges and problems in the routing and switching of packets in the wireless mesh network routing protocols led to a proposal on the resolution of these failures with a combination algorithm and a management based security for the network and its transmitted packets. There are equally contentious services like reliability of the network and quality of service for real-time multimedia traffic flows with other challenges such as path computation and selection in the wireless mesh network.
This thesis is therefore a cumulative proposal to the resolution of the outlined challenges and open research areas posed by using wireless mesh network routing protocol. It advances the resolution of these challenges in the mesh environment using a hybrid optimization – traffic engineering, to increase the effectiveness and the reliability of the network. It also proffers a cumulative resolution of the diverse contributions on wireless mesh network routing protocol and transmission. Adaptation and optimization are carried out on the wireless mesh network designed network using traffic engineering mechanism and technique. The research examines the patterns of mesh packet transmission and evaluates the challenges and failures in the mesh network packet transmission. It develops a solution based algorithm for resolutions and proposes the traffic engineering based solution.. These resultant performances and analysis are usually tested and compared over wireless mesh IEEE802.11n or other older proposed documented solution.
This thesis used a carefully designed campus mesh network to show a comparative evaluation of an optimal performance of the mesh nodes and routers over a normal IEE802.11n based wireless domain network to show differentiation by optimization using the created algorithms. Furthermore, the indexes of performance being the metric are used to measure the utility and the reliability, including capacity and throughput at the destination during traffic engineered transmission. In addition, the security of these transmitted data and packets are optimized under a traffic engineered technique. Finally, this thesis offers an understanding to the security contribution using traffic engineering resolution to create a management algorithm for processing and computation of the wireless mesh networks security needs. The results of this thesis confirmed, completed and extended the existing predictions with real measurement
Modélisation et simulation de réseaux locaux et personnels sans fil : intégration des couches PHY et MAC
Dans ce travail nous nous intéressons à la modélisation des couches MAC et PHY dans le cadre des réseaux sans fil à faible, portée. Il présente les techniques de modélisation utilisées pour l'intégration des couches MAC-PHYs (Medium Access Control and Physical layer) de type IR-UWB (Impulse Radio Ultra Wideband) d'une part, et des nouvelles techniques de transmission à 60GHz incluant le beamforming d'autre part, dans le simulateur GloMoSim/QualNet. La modélisation de IR-UWB est basée sur la prise en compte directe des collisions d'impulsions et de l'interférence multi-utilisateur au niveau de la couche PHY par l'introduction du concept de séquences de réception et la notion d'orthogonalité en réception. L'architecture de modélisation proposée est basée sur l'utilisation d'une matrice d'interférence, elle a été développée en deux étapes : une première modélisation basée sur des trains d'impulsions uniformément espacées et une deuxième modélisation plus complète prenant en compte l'utilisation des séquences de sauts aléatoires également appelés séquences de time hopping. L'évaluation de performances de cette partie est basée sur une application typique des réseaux de capteurs dans le cadre d'une application de détection d'intrusion sur une surface protégée. La modélisation à 60 GHz à pour but la prise en compte des nouvelles techniques d'amélioration du débit, notamment l'agrégation et le beamforming. La prise en compte du beamforming est basée sur la définition, des diagrammes de rayonnement des antennes ainsi que de l'interface MAC-PHY/Antenne. La modélisation des deux protocoles de beamforming définis dans le standard 802.15.3c est également effectuée. L'évaluation de performances de cette partie est basée sur un système de distribution de contenu multimédia.In this work, we focus on physical and medium access control layer modeling and simulation for short range wireless communication. In particular, the modeling of the Impulse Radio Ultra Wide Band technique for wireless sensor networks and the high data rate communication modeling which uses millimeter wave and beamforming.
The first part deals with the modeling of Impulse Radio Ultra Wide Band. The proposed model takes into account the pulse collision induced by multiple concurrent transmissions at the physical layer which is also called multi user interference. This aspect is accurately introduced thanks to the concept of reception time hopping sequences of concurrent reception and their orthogonality. The simulation architecture is built using two models: the first model is based on a uniformly distributed pulse train and the second model, more complete, takes into account variable time hopping sequences. The performance evaluation of this part is based on a typical wireless sensor networks application, in which sensor nodes are scattered on a particular area to detect and report intrusion events to a base station.
The second part deals with the modeling of high data rate communication using millimeter wave. The targeted goal of millimeter wave transmission is to increase the data rate using some novel techniques: beamforming and data aggregation. Beamforming is modeled on the so-called codebook beamforming defined as the new beamforming technique for high data rate wireless communication standards. A methodology is developed to take into account the radiation pattern defined by the codebook indexes. For each index the gain of the directional antenna is computed for each direction. This is used in the simulation model physical layer to determine the directional antenna gain in a particular direction during the propagation stage. The defined protocols for sector level and beam level training defined in the 802.15.3c draft are also modeled. The performance evaluation of this part is based on a multimedia distribution system