Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320661
I. Yulita, R. Rosadi, S. Purwani
This study investigates the performance of Fuzzy Long Short-Term Memory (FLSTM) for sleep stage classification. The proposed FLSTM consists of the Fuzzy C-Means Clustering which functions as feature representation, and Long Short-Term Memory (LSTM) as the final classifier. The performance was evaluated based on accuracy, precision, and F-measure by testing some cluster number values from Fuzzy C-Means Clustering. The output of this clustering becomes input for Long Short-Term Memory. The result shows that the best performance achieved when using as much as 9 clusters.
{"title":"Sleep stage classification using fuzzy long short-term memory","authors":"I. Yulita, R. Rosadi, S. Purwani","doi":"10.1109/CAIPT.2017.8320661","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320661","url":null,"abstract":"This study investigates the performance of Fuzzy Long Short-Term Memory (FLSTM) for sleep stage classification. The proposed FLSTM consists of the Fuzzy C-Means Clustering which functions as feature representation, and Long Short-Term Memory (LSTM) as the final classifier. The performance was evaluated based on accuracy, precision, and F-measure by testing some cluster number values from Fuzzy C-Means Clustering. The output of this clustering becomes input for Long Short-Term Memory. The result shows that the best performance achieved when using as much as 9 clusters.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115545877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320682
Sejin Choi, Kwang-yeob Lee
Training of the convolutional neural network (CNN) entails many iterative computations. In addition, as a depth of neural network has increased and the number of training data has become large in recent years, the amount of computation required for the training has also dramatically increased. The parallel operation using the hardware feature of general-purpose computing on graphics processing units (GPGPU) has been known to be suitable to be applied to neural networks. Accordingly, this paper proposed a method to improve a training time by parallelizing a training algorithm in the CNN using the Compute Unified Device Architecture (CUDA) capable of controlling NVIDIA GPGPU. The experiment result showed that the proposed method in this study improved about 2.5 times faster training speed than existing training method that makes use of only a single CPU.
{"title":"A CUDA-based implementation of convolutional neural network","authors":"Sejin Choi, Kwang-yeob Lee","doi":"10.1109/CAIPT.2017.8320682","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320682","url":null,"abstract":"Training of the convolutional neural network (CNN) entails many iterative computations. In addition, as a depth of neural network has increased and the number of training data has become large in recent years, the amount of computation required for the training has also dramatically increased. The parallel operation using the hardware feature of general-purpose computing on graphics processing units (GPGPU) has been known to be suitable to be applied to neural networks. Accordingly, this paper proposed a method to improve a training time by parallelizing a training algorithm in the CNN using the Compute Unified Device Architecture (CUDA) capable of controlling NVIDIA GPGPU. The experiment result showed that the proposed method in this study improved about 2.5 times faster training speed than existing training method that makes use of only a single CPU.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124404012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320655
Yoon-Deock Lee, Jongpil Jeong
In this paper, in order for the signaling overhead to be distributed evenly on the boundary of the regional network, each MN's dynamic mobility and traffic load is adjusted according to the PMIPv6 (Proxy Mobile IPv6) networks in the proposed dynamic regional mobility management scheme (dMMS). Each user in a distributed network system, that offers the least amount of signaling traffic, is tailored to the optimized system configuration. Signaling cost function is used in order to propose a new discrete analytical model, based on the MN's mobility and packet arrival patterns. Location update and packet delivery costs are used to calculate the total average, and the optimized area to determine the size of the network is proposed. The results of the mathematical analysis and the proposed scheme, in terms of reducing the cost of the signaling, were found to have excellent performance.
本文提出的动态区域移动性管理方案(dMMS)中,根据PMIPv6 (Proxy Mobile IPv6)网络对各MN的动态移动性和业务负载进行调整,使信令开销在区域网络边界上均匀分布。分布式网络系统中的每个用户,提供最少的信令流量,被定制为优化的系统配置。基于MN的移动性和数据包到达模式,利用信令代价函数提出了一种新的离散分析模型。利用位置更新和分组传输成本计算总平均值,并提出了确定网络规模的最优区域。数学分析结果表明,所提出的方案在降低信令成本方面具有优异的性能。
{"title":"User effects of a distributed dynamic scheme in PMIPv6 networks","authors":"Yoon-Deock Lee, Jongpil Jeong","doi":"10.1109/CAIPT.2017.8320655","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320655","url":null,"abstract":"In this paper, in order for the signaling overhead to be distributed evenly on the boundary of the regional network, each MN's dynamic mobility and traffic load is adjusted according to the PMIPv6 (Proxy Mobile IPv6) networks in the proposed dynamic regional mobility management scheme (dMMS). Each user in a distributed network system, that offers the least amount of signaling traffic, is tailored to the optimized system configuration. Signaling cost function is used in order to propose a new discrete analytical model, based on the MN's mobility and packet arrival patterns. Location update and packet delivery costs are used to calculate the total average, and the optimized area to determine the size of the network is proposed. The results of the mathematical analysis and the proposed scheme, in terms of reducing the cost of the signaling, were found to have excellent performance.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123719511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320743
Yun-Young Hwang, Jung-Hoon Park, Seoung Eun Park, Jungsun Yoon
Value services for people living in the flood of information is a service that reduces the time for information retrieval. To reduce the information retrieval time, the system should provide only the content that the user needs. The system collects and analyzes all the information related to the user to select the content that the user needs. Particularly, in the case of academics, such information includes major field, final degree, occupational group information, and contents information used by the user. This paper analyzes the characteristics of people in academia by using KOSEN system and proposes a personalized recommendation system for them. KOSEN is a web site where Korean scientists from all over the world come together to share information and networking. In addition, this paper suggests the services and contents required by KOSEN members considering the residential areas due to the nature of KOSEN. To do this, we use a big data processing solution and describe the analysis result.
{"title":"The mechanism of personalized service recommendation for the academic field","authors":"Yun-Young Hwang, Jung-Hoon Park, Seoung Eun Park, Jungsun Yoon","doi":"10.1109/CAIPT.2017.8320743","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320743","url":null,"abstract":"Value services for people living in the flood of information is a service that reduces the time for information retrieval. To reduce the information retrieval time, the system should provide only the content that the user needs. The system collects and analyzes all the information related to the user to select the content that the user needs. Particularly, in the case of academics, such information includes major field, final degree, occupational group information, and contents information used by the user. This paper analyzes the characteristics of people in academia by using KOSEN system and proposes a personalized recommendation system for them. KOSEN is a web site where Korean scientists from all over the world come together to share information and networking. In addition, this paper suggests the services and contents required by KOSEN members considering the residential areas due to the nature of KOSEN. To do this, we use a big data processing solution and describe the analysis result.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116942073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320665
Sandfreni, Fransiskus Adikara
It is very necessary to implement information technology governance in government corporate organization. Nowadays, information technology investments and IT-enabler must be effectively manage, especially in governance institution. This research is an assessment of IT Governance model for government corporate in Indonesia. This paper shows and describes the result of COBIT 5.0 framework (IT Governance framework) implementation in PTP Mitra Ogan. In this paper, implementation of COBIT 5.0 framework scope is applied especially in the domain of build, acquire, and implementation (process ID number 04), from the area of management. Purpose of this case study is to get the result of COBIT 5.0 framework implementation, describe step-by-step procedures or processes to improve IT Governance implementation, and finally give recommendations for governing IT of PTP Mitra Ogan in the future.
{"title":"Capability level assessment of IT governance in PTP Mitra Ogan: COBIT 5 framework for BAI 04 process","authors":"Sandfreni, Fransiskus Adikara","doi":"10.1109/CAIPT.2017.8320665","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320665","url":null,"abstract":"It is very necessary to implement information technology governance in government corporate organization. Nowadays, information technology investments and IT-enabler must be effectively manage, especially in governance institution. This research is an assessment of IT Governance model for government corporate in Indonesia. This paper shows and describes the result of COBIT 5.0 framework (IT Governance framework) implementation in PTP Mitra Ogan. In this paper, implementation of COBIT 5.0 framework scope is applied especially in the domain of build, acquire, and implementation (process ID number 04), from the area of management. Purpose of this case study is to get the result of COBIT 5.0 framework implementation, describe step-by-step procedures or processes to improve IT Governance implementation, and finally give recommendations for governing IT of PTP Mitra Ogan in the future.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121883882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320664
R. Rahmat, Eka Tama Herly, B. Siregar, M. F. Syahputra, O. S. Sitompul
In performing an assignment, every employee is expected to complete the work to some level. However, the misuse of working hours happens regularly in their working environment, which mean they shorten their workload and working hour. This problem led to the need to build a system as an alternative in monitoring the presence of the employee in their working environment. The type of the work that requires monitoring due to its presence in the location are customer service, call center, cashier, etc. Monitoring the presence of the employee can be done using tools such as RFID. Trilateration method was used to determine object location using signal value received of an object from multiple transmitters. The signal value can be then converted to a distance value between the object and the transmitters also can be formed three circles with the radius of each circle is the distance value between the object with the transmitters. The result from our system is the employee's location on building virtual maps. System will determine whether the employee location is in their working environment or not then it will produce daily reports on the employee working hours. In the end, system will sum up the workload obtained from the results of its employee presence monitoring.
{"title":"RFID presence monitoring system as an input to measure the workload of employee","authors":"R. Rahmat, Eka Tama Herly, B. Siregar, M. F. Syahputra, O. S. Sitompul","doi":"10.1109/CAIPT.2017.8320664","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320664","url":null,"abstract":"In performing an assignment, every employee is expected to complete the work to some level. However, the misuse of working hours happens regularly in their working environment, which mean they shorten their workload and working hour. This problem led to the need to build a system as an alternative in monitoring the presence of the employee in their working environment. The type of the work that requires monitoring due to its presence in the location are customer service, call center, cashier, etc. Monitoring the presence of the employee can be done using tools such as RFID. Trilateration method was used to determine object location using signal value received of an object from multiple transmitters. The signal value can be then converted to a distance value between the object and the transmitters also can be formed three circles with the radius of each circle is the distance value between the object with the transmitters. The result from our system is the employee's location on building virtual maps. System will determine whether the employee location is in their working environment or not then it will produce daily reports on the employee working hours. In the end, system will sum up the workload obtained from the results of its employee presence monitoring.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130828452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320723
Gi-Chul Yang
To solve the problem of text-based password authentication, graphical passwords using images have evolved. Graphical passwords process authentication by selecting the exact positions on the image shown on the screen. These conventional graphical password schemes cannot be used for recognition if the correct points on the screen cannot be selected in the same order. To solve this problem, a new graphical password scheme called PassPositions was introduced. PassPositions were designed based on universal design, so it is user-friendly for everyone, regardless of their physical abilities. However, in certain cases, PassPositions does have some weak points. In this paper will identify a problem of PassPositions, and improve the PassPositions.
{"title":"PassPositions: A secure and user-friendly graphical password scheme","authors":"Gi-Chul Yang","doi":"10.1109/CAIPT.2017.8320723","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320723","url":null,"abstract":"To solve the problem of text-based password authentication, graphical passwords using images have evolved. Graphical passwords process authentication by selecting the exact positions on the image shown on the screen. These conventional graphical password schemes cannot be used for recognition if the correct points on the screen cannot be selected in the same order. To solve this problem, a new graphical password scheme called PassPositions was introduced. PassPositions were designed based on universal design, so it is user-friendly for everyone, regardless of their physical abilities. However, in certain cases, PassPositions does have some weak points. In this paper will identify a problem of PassPositions, and improve the PassPositions.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117226347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320731
Nur Kholis Mansur, Fahrobby Adnan
The tribe Osing (Suku Osing) is a native of Banyuwangi and is the majority population in several sub districts in Banyuwangi District. The Osing tribe is a Javanese sub-tribe. The Osing tribe occupies several sub-districts in central and northern Banyuwangi district. The cultural potential possessed by the Osing Tribe is very diverse. Arts, crafts, food, herbal medicines / more familiarly called “jamu”, language, and also customs are the cultural potential possessed by the Osing Tribe. The need for information by the community can easily be met with the utilization of the internet. Website is one of the media that become the reference for the public to get information. When people search for information on search engines, it is not uncommon for websites that appear on the first page of a search engine to provide information that cannot be justified / questionable validity. For that we need an effort to provide appropriate / relevant information related to the culture of Osing tribe through the website. www.osingbanyuwangi.com is a website that provide all about Osing tribe potential resource. In additions it requires a Search Engine Optimization (SEO) strategy that is able to make the website appear on the earlier pages of search engines when people enter keywords related to the cultural potential of the Osing tribe. Increasing the possibility ofpeople to access the website.
{"title":"Search engine optimization: Raising the ranking of “Suku Osing” websites on search engine page","authors":"Nur Kholis Mansur, Fahrobby Adnan","doi":"10.1109/CAIPT.2017.8320731","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320731","url":null,"abstract":"The tribe Osing (Suku Osing) is a native of Banyuwangi and is the majority population in several sub districts in Banyuwangi District. The Osing tribe is a Javanese sub-tribe. The Osing tribe occupies several sub-districts in central and northern Banyuwangi district. The cultural potential possessed by the Osing Tribe is very diverse. Arts, crafts, food, herbal medicines / more familiarly called “jamu”, language, and also customs are the cultural potential possessed by the Osing Tribe. The need for information by the community can easily be met with the utilization of the internet. Website is one of the media that become the reference for the public to get information. When people search for information on search engines, it is not uncommon for websites that appear on the first page of a search engine to provide information that cannot be justified / questionable validity. For that we need an effort to provide appropriate / relevant information related to the culture of Osing tribe through the website. www.osingbanyuwangi.com is a website that provide all about Osing tribe potential resource. In additions it requires a Search Engine Optimization (SEO) strategy that is able to make the website appear on the earlier pages of search engines when people enter keywords related to the cultural potential of the Osing tribe. Increasing the possibility ofpeople to access the website.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131704934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320685
Hyeon Gyu Kim
Heartbeats are signals periodically generated from remote sensors attached to a system whose status needs to be continuously monitored for safety. If consecutive n heartbeats are not transferred to a monitoring site, the target system is considered abnormal and might be shut down as in the case of monitoring nuclear power plants. In this paper, we propose a method to estimate the heartbeat count in the safety critical systems. Given a user-defined safety bound, the proposed method estimates the count n which satisfies the safety bound.
{"title":"Heartbeat count estimation in safety critical systems","authors":"Hyeon Gyu Kim","doi":"10.1109/CAIPT.2017.8320685","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320685","url":null,"abstract":"Heartbeats are signals periodically generated from remote sensors attached to a system whose status needs to be continuously monitored for safety. If consecutive n heartbeats are not transferred to a monitoring site, the target system is considered abnormal and might be shut down as in the case of monitoring nuclear power plants. In this paper, we propose a method to estimate the heartbeat count in the safety critical systems. Given a user-defined safety bound, the proposed method estimates the count n which satisfies the safety bound.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320725
JungSoo Park, Souhwan Jung
The existing AP and Radius Server used the SSK(Shared Secret Key) to authenticate the accounting messages between devices. This SSK had the vulnerability of easy exposure because of the lack of encryption and difficulty of administration for the AP and RADIUS Server due to the requirement of direct input by the administrator. After the SSK is exposed, a billing problem may be induced by sending a user's counterfeit accounting information which is possible by creating a Rouge AP with a forged MAC address and connecting to the server. This paper attempts to resolve this issue by creating SSK with the characteristic of Physical Uncloneable Functions (PUFs) and propose the method of periodic automatic update through the server. A more secure and powerful protocol will be provided by adding the PUF hardware to the AP which creates a non-duplicable key that not only protects the AP but also encrypts the message and additionally assures its integrity. Furthermore, the proposed protocol will have a centralized administration through batch updates and it will eliminate the inconvenience of the administrator which in existing methods required manually configuration of each SSK values in the AP and RADIUS server. Conclusively, this paper adds PUF to the protocol to protect the SSK with augmented security and proposes the centralized administration of the SSK value in replacement of the current administration method of direct input.
{"title":"Shared secret key update scheme between RADIUS server and access point using PUFs","authors":"JungSoo Park, Souhwan Jung","doi":"10.1109/CAIPT.2017.8320725","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320725","url":null,"abstract":"The existing AP and Radius Server used the SSK(Shared Secret Key) to authenticate the accounting messages between devices. This SSK had the vulnerability of easy exposure because of the lack of encryption and difficulty of administration for the AP and RADIUS Server due to the requirement of direct input by the administrator. After the SSK is exposed, a billing problem may be induced by sending a user's counterfeit accounting information which is possible by creating a Rouge AP with a forged MAC address and connecting to the server. This paper attempts to resolve this issue by creating SSK with the characteristic of Physical Uncloneable Functions (PUFs) and propose the method of periodic automatic update through the server. A more secure and powerful protocol will be provided by adding the PUF hardware to the AP which creates a non-duplicable key that not only protects the AP but also encrypts the message and additionally assures its integrity. Furthermore, the proposed protocol will have a centralized administration through batch updates and it will eliminate the inconvenience of the administrator which in existing methods required manually configuration of each SSK values in the AP and RADIUS server. Conclusively, this paper adds PUF to the protocol to protect the SSK with augmented security and proposes the centralized administration of the SSK value in replacement of the current administration method of direct input.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129719297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}