Authentication study and implementation using IPSEC and IEEE 802.1X technology

Researches in Information Technology have been subjected to a tremendous speed-up in recent years mainly due to the affordability of the technology and consequently, to a strongly increased interest of users. In addition, the security systems which imply networks have increased rapidly. Currently, m...

Full description

Saved in:
Bibliographic Details
Main Author: Al-Amodi, Ahmed Omar
Format: Thesis
Language:English
Published: 2009
Subjects:
Online Access:http://eprints.utm.my/id/eprint/5147/1/AhmedOmarMFSK2009.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.5147
record_format uketd_dc
spelling my-utm-ep.51472018-02-28T07:55:13Z Authentication study and implementation using IPSEC and IEEE 802.1X technology 2009-04 Al-Amodi, Ahmed Omar QA75 Electronic computers. Computer science Researches in Information Technology have been subjected to a tremendous speed-up in recent years mainly due to the affordability of the technology and consequently, to a strongly increased interest of users. In addition, the security systems which imply networks have increased rapidly. Currently, many organizations provide extensive network services to their staff. This poses a problem of securing access to the organization networks. Therefore, authentication has become an inevitable reality in the design of such systems. The research sought for the best authentication mechanism suitable for organizations generally, and to university campuses, particularly. The result is an authentication scheme based on IPSec and IEEE 802.1x technology. The scheme provides secure access to users engaged in the network connection. It implements a two-factor authentication. The first factor is the network policy combination which the user provides prior logging onto the system. The second factor is the certificates that are stored locally in a client?s desktop/laptop. The mechanism involved in the authentication is based on EAP-TLS, which is a type of authentication method provided by IEEE 802.1x technology. The result of the implemented system is a highly secured scheme that provides both user and computer (machine) authentication. Only legitimate users with legitimate machines (computers) can access the organization network system in an authorized way. 2009-04 Thesis http://eprints.utm.my/id/eprint/5147/ http://eprints.utm.my/id/eprint/5147/1/AhmedOmarMFSK2009.pdf application/pdf en public masters Universiti Teknologi Malaysia, Faculty of Computer Science and Information System Faculty of Computer Science and Information System
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic QA75 Electronic computers
Computer science
spellingShingle QA75 Electronic computers
Computer science
Al-Amodi, Ahmed Omar
Authentication study and implementation using IPSEC and IEEE 802.1X technology
description Researches in Information Technology have been subjected to a tremendous speed-up in recent years mainly due to the affordability of the technology and consequently, to a strongly increased interest of users. In addition, the security systems which imply networks have increased rapidly. Currently, many organizations provide extensive network services to their staff. This poses a problem of securing access to the organization networks. Therefore, authentication has become an inevitable reality in the design of such systems. The research sought for the best authentication mechanism suitable for organizations generally, and to university campuses, particularly. The result is an authentication scheme based on IPSec and IEEE 802.1x technology. The scheme provides secure access to users engaged in the network connection. It implements a two-factor authentication. The first factor is the network policy combination which the user provides prior logging onto the system. The second factor is the certificates that are stored locally in a client?s desktop/laptop. The mechanism involved in the authentication is based on EAP-TLS, which is a type of authentication method provided by IEEE 802.1x technology. The result of the implemented system is a highly secured scheme that provides both user and computer (machine) authentication. Only legitimate users with legitimate machines (computers) can access the organization network system in an authorized way.
format Thesis
qualification_level Master's degree
author Al-Amodi, Ahmed Omar
author_facet Al-Amodi, Ahmed Omar
author_sort Al-Amodi, Ahmed Omar
title Authentication study and implementation using IPSEC and IEEE 802.1X technology
title_short Authentication study and implementation using IPSEC and IEEE 802.1X technology
title_full Authentication study and implementation using IPSEC and IEEE 802.1X technology
title_fullStr Authentication study and implementation using IPSEC and IEEE 802.1X technology
title_full_unstemmed Authentication study and implementation using IPSEC and IEEE 802.1X technology
title_sort authentication study and implementation using ipsec and ieee 802.1x technology
granting_institution Universiti Teknologi Malaysia, Faculty of Computer Science and Information System
granting_department Faculty of Computer Science and Information System
publishDate 2009
url http://eprints.utm.my/id/eprint/5147/1/AhmedOmarMFSK2009.pdf
_version_ 1747814567831928832