Authentication study and implementation using IPSEC and IEEE 802.1X technology

Researches in Information Technology have been subjected to a tremendous speed-up in recent years mainly due to the affordability of the technology and consequently, to a strongly increased interest of users. In addition, the security systems which imply networks have increased rapidly. Currently, m...

Full description

Bibliographic Details
Main Author: Al-Amodi, Ahmed Omar
Format: Thesis
Language:English
Published: 2009
Subjects:
Online Access:http://eprints.utm.my/5147/
http://eprints.utm.my/5147/1/AhmedOmarMFSK2009.pdf
_version_ 1848890984517074944
author Al-Amodi, Ahmed Omar
author_facet Al-Amodi, Ahmed Omar
author_sort Al-Amodi, Ahmed Omar
building UTeM Institutional Repository
collection Online Access
description Researches in Information Technology have been subjected to a tremendous speed-up in recent years mainly due to the affordability of the technology and consequently, to a strongly increased interest of users. In addition, the security systems which imply networks have increased rapidly. Currently, many organizations provide extensive network services to their staff. This poses a problem of securing access to the organization networks. Therefore, authentication has become an inevitable reality in the design of such systems. The research sought for the best authentication mechanism suitable for organizations generally, and to university campuses, particularly. The result is an authentication scheme based on IPSec and IEEE 802.1x technology. The scheme provides secure access to users engaged in the network connection. It implements a two-factor authentication. The first factor is the network policy combination which the user provides prior logging onto the system. The second factor is the certificates that are stored locally in a client?s desktop/laptop. The mechanism involved in the authentication is based on EAP-TLS, which is a type of authentication method provided by IEEE 802.1x technology. The result of the implemented system is a highly secured scheme that provides both user and computer (machine) authentication. Only legitimate users with legitimate machines (computers) can access the organization network system in an authorized way.
first_indexed 2025-11-15T20:50:45Z
format Thesis
id utm-5147
institution Universiti Teknologi Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T20:50:45Z
publishDate 2009
recordtype eprints
repository_type Digital Repository
spelling utm-51472018-02-28T07:55:13Z http://eprints.utm.my/5147/ Authentication study and implementation using IPSEC and IEEE 802.1X technology Al-Amodi, Ahmed Omar QA75 Electronic computers. Computer science Researches in Information Technology have been subjected to a tremendous speed-up in recent years mainly due to the affordability of the technology and consequently, to a strongly increased interest of users. In addition, the security systems which imply networks have increased rapidly. Currently, many organizations provide extensive network services to their staff. This poses a problem of securing access to the organization networks. Therefore, authentication has become an inevitable reality in the design of such systems. The research sought for the best authentication mechanism suitable for organizations generally, and to university campuses, particularly. The result is an authentication scheme based on IPSec and IEEE 802.1x technology. The scheme provides secure access to users engaged in the network connection. It implements a two-factor authentication. The first factor is the network policy combination which the user provides prior logging onto the system. The second factor is the certificates that are stored locally in a client?s desktop/laptop. The mechanism involved in the authentication is based on EAP-TLS, which is a type of authentication method provided by IEEE 802.1x technology. The result of the implemented system is a highly secured scheme that provides both user and computer (machine) authentication. Only legitimate users with legitimate machines (computers) can access the organization network system in an authorized way. 2009-04 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/5147/1/AhmedOmarMFSK2009.pdf Al-Amodi, Ahmed Omar (2009) Authentication study and implementation using IPSEC and IEEE 802.1X technology. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information System.
spellingShingle QA75 Electronic computers. Computer science
Al-Amodi, Ahmed Omar
Authentication study and implementation using IPSEC and IEEE 802.1X technology
title Authentication study and implementation using IPSEC and IEEE 802.1X technology
title_full Authentication study and implementation using IPSEC and IEEE 802.1X technology
title_fullStr Authentication study and implementation using IPSEC and IEEE 802.1X technology
title_full_unstemmed Authentication study and implementation using IPSEC and IEEE 802.1X technology
title_short Authentication study and implementation using IPSEC and IEEE 802.1X technology
title_sort authentication study and implementation using ipsec and ieee 802.1x technology
topic QA75 Electronic computers. Computer science
url http://eprints.utm.my/5147/
http://eprints.utm.my/5147/1/AhmedOmarMFSK2009.pdf