RESPONSE TIME IMPROVEMENT ON ONE TIME PASSWORD (OTP) TECHNIQUE TO PREVENT REPLAY ATTACK IN A RADIUS ENVIRONMENT.

Yusuf Abdullahi, M. B. Mu’azu, A. Adedokun
{"title":"RESPONSE TIME IMPROVEMENT ON ONE TIME PASSWORD (OTP) TECHNIQUE TO PREVENT REPLAY ATTACK IN A RADIUS ENVIRONMENT.","authors":"Yusuf Abdullahi, M. B. Mu’azu, A. Adedokun","doi":"10.9734/BJAST/2017/29503","DOIUrl":null,"url":null,"abstract":"This research is aimed at the modification of the Remote Access Dial in User Server (RADIUS) protocol with the one-time password (OTP) technique for the authentication environment with a captive portal to prevent replay attacks. One of the important network security measures on a campus network is the use of authentication for identification of legitimate users and one of the most widely used solution in network authentication is the RADIUS protocol. However, there are potential security vulnerabilities in the RADIUS network especially for networks using captive Galley Proof server in a captive portal environment which is 1000 ms [1]. After improving the OTP technique by integrating all the variants of OTP with the RADIUS server on a single server using the simulated ABU campus network using GNS3, the result shows a significant improvement over the above results. The results obtained shows the average response time for TOTP, CROTP and HOTP as 1.3s, 2s and 1.9s. The validation, based on the developed and simulated configuration was carried out using live servers, routers and switches and the results showed improvement over the above results the average response time for TOTP, CROTP and HOTP were obtained as 0.4s, 0.9s and 0.9s respectively. This shows significant improvement in the TOTP, CROPT and HOTP respectively. The result shows the average response time is less than the recommended 1000ms for RADIUS server response time in a captive portal environment.","PeriodicalId":91221,"journal":{"name":"British journal of applied science & technology","volume":"19 1","pages":"1-37"},"PeriodicalIF":0.0000,"publicationDate":"2017-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"British journal of applied science & technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9734/BJAST/2017/29503","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This research is aimed at the modification of the Remote Access Dial in User Server (RADIUS) protocol with the one-time password (OTP) technique for the authentication environment with a captive portal to prevent replay attacks. One of the important network security measures on a campus network is the use of authentication for identification of legitimate users and one of the most widely used solution in network authentication is the RADIUS protocol. However, there are potential security vulnerabilities in the RADIUS network especially for networks using captive Galley Proof server in a captive portal environment which is 1000 ms [1]. After improving the OTP technique by integrating all the variants of OTP with the RADIUS server on a single server using the simulated ABU campus network using GNS3, the result shows a significant improvement over the above results. The results obtained shows the average response time for TOTP, CROTP and HOTP as 1.3s, 2s and 1.9s. The validation, based on the developed and simulated configuration was carried out using live servers, routers and switches and the results showed improvement over the above results the average response time for TOTP, CROTP and HOTP were obtained as 0.4s, 0.9s and 0.9s respectively. This shows significant improvement in the TOTP, CROPT and HOTP respectively. The result shows the average response time is less than the recommended 1000ms for RADIUS server response time in a captive portal environment.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
改进一次性密码(otp)技术的响应时间,防止radius环境下的重放攻击。
本研究旨在利用一次性密码(OTP)技术对用户服务器远程接入拨号(RADIUS)协议进行修改,使其适用于带有强制门户的认证环境,以防止重放攻击。校园网中重要的网络安全措施之一是使用认证来识别合法用户,而RADIUS协议是目前应用最广泛的网络认证解决方案之一。然而,在RADIUS网络中存在潜在的安全漏洞,特别是对于在强制门户环境中使用强制Galley Proof服务器的网络,该环境为1000 ms[1]。在使用GNS3模拟的ABU校园网上,通过将所有OTP变体与RADIUS服务器集成到单个服务器上,改进了OTP技术,结果显示比上述结果有显着改善。结果表明,TOTP、CROTP和HOTP的平均响应时间分别为1.3s、2s和1.9s。基于所开发和模拟的配置,使用实时服务器、路由器和交换机进行验证,结果表明,与上述结果相比,TOTP、CROTP和HOTP的平均响应时间分别为0.4s、0.9s和0.9s。这分别显示了TOTP、CROPT和HOTP的显著改善。结果显示,在强制门户环境中,平均响应时间小于建议的RADIUS服务器响应时间1000ms。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Superluminal Hydrogen Atom in a Constant Magnetic Field in (3+1)-dimensional Spacetime (II) Climate Change and Its Impact on Nutritional Status and Health of Children Effect of Bio-stimulants on Improving Floral Characteristics, Yield and Quality of Apple cv. Red Delicious An Analysis of the Potential, Constraints and Strategies for Development of Marirangwe Farm (A Project of the Women’s University in Africa) Choosing the Optimal Segmentation Level for POS Tagging of the Quranic Arabic
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1