Azween Abdullah
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

EAP-Based Authentication for Ad Hoc Network Muhammad Agni Catur Bhakti; Azween Abdullah; Low Tan Jung
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2007
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless network has been deployed worldwide, but some security issues in wireless network might haveprevented its further acceptance. One of the solutions to overcome the limitation of wireless network security isthe IEEE 802.1X specification, a mechanism for port-based network access control, which is based onExtensible Authentication Protocol (EAP). It is an authentication framework that can support multipleauthentication methods. EAP can run over many types of data-link layer and it is flexible in its implementation.Thus, it might be possible to use EAP as a generic authentication mechanism in various wireless networks,including ad hoc network. This paper describes possible use of EAP in ad hoc network and proposes amechanism / approach to implement EAP in ad hoc network using EAP multiplexing model with master node asauthentication server.Keywords: Authentication, IEEE 802.1X, Extensible Authentication Protocol (EAP), ad hoc.
Survivability Assessment: Modeling A Recovery Process Irving Vitra Paputungan; Azween Abdullah
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2007
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Survivability is the ability of a system to continue operating, in a timely manner, in the presence ofattacks, failures, or accidents. Recovery in survivability is a process of a system to heal or recover from damageas early as possible to fulfill its mission as condition permit. In this paper, we show a preliminary recoverymodel to enhance the system survivability. The model focuses on how we preserve the system and resumes itscritical service under attacks as soon as possible.Keywords: survivability, recovery, critical service