Implementation of Wireless User Authentication using WLC-Forti Framework
Keywords:Cloud, Authentication, LDAP, Wireless access, Wireless Controller
Internet access at this time is a daily necessity that cannot be denied. It is certain that most institutions and business entities require internet access in carrying out their activities, including educational institutions. With the development of mobile computer technology in which more users use mobile devices to access the internet, wireless-based network infrastructure is a demand that cannot be postponed any longer. By using a wireless connection to connect to the network, authentication becomes something that must be considered, the use of access to the network by unwanted parties can harm other parties. Changing passwords regularly is important to avoid misuse of access to the network by other parties. This paper presents a problem where when an educational institution implements the Bring Your Own Device (BYOD) program, students and teachers cannot change passwords using the personal device used, this is because the personal device is not registered with the domain controller at the institution. The solution proposed in this article is to move the NPS RADIUS server function on the local site to LDAP in the cloud using a combination of WLC which handles Wi-Fi clients and Fortinet which handles authentication to the cloud. The implementation results show that the WLC-Forti framework functions well.
S. Pranata and H. T. Nugroho, “2fysh two factor authentication you should have for password replacement,” vol. 17, no. 2, pp. 693–702, 2019, doi.v17i2.9187.
S. W. Chin, K. G. Tay, C. C. Chew, A. Huong, and R. A. Rahim, “Dorsal hand vein authentication system using artificial neural network,” vol. 21, no. 3, pp. 1837–1846, 2021, doi 10.11591ijeecs.v21.i3.pp1837-1846.
T. Mehraj, M. A. Sheheryar, S. A. Lone, and A. H. Mir, “A critical insight into the identity authentication systems on smartphoneS” vol. 13, no. 3, pp. 982–989, 2019, doi 10.11591ijeecs.v13.i3.pp982-989.
B. Hajimirzaei, “Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm,” Ict Express, vol. 5, no. 1, pp. 56–59, 2019, doi 10.1016/j.icte.2018.01.014.
J. Zhou and Q. Wang, “Lightweight Authentication Billing Enhancement Mechanism Based on the Fourier Fast Transform Algorithm,” vol. 2022, 2022.
P. Wanda and H. J. Jie, “Efficient Data Security for Mobile Instant Messenger,” vol. 16, no. 3, pp. 1426–1434, 2018, doi:10.12928/TELKOMNIKA.v16i3.4045.
Z. Asmae, P. El, and O. Nabih, “Implementation of a bluetooth attack on controller area network,” vol. 21, no. 1, pp. 321–327, 2021, doi 10.11591/ijeecs.v21.i1.pp321-327.
C. Alezander, O. Villanueva, and A. Roman-gonzalez, “International Journal of Advanced and Applied Sciences Implementation of a RADIUS server for access control through authentication in wireless networks,” vol. 10, no. 3, pp. 183–188, 2023.
S. J. Mohammed and S. A. Mehdi, “Web application authentication using zkp and novel 6d chaotic system,” vol. 20, no. 3, pp. 1522–1529, 2020, doi: 10.11591/ijeecs.v20.i3.pp1522-1529.
D. Sudyana and N. Lizarti, “Forensic Investigation Framework on Server Side of Private Cloud Computing,” vol. 10, no. 3, pp. 181–192, 2019.
M. H. Mahdi and I. A. Ibrahim, “Enhancing the security of quality of service oriented distributed routing protocol for hybrid wireless network,” vol. 30, no. 1, pp. 121–128, 2023, doi 10.11591/ijeecs.v30.i1.pp121-128.
A. A. Talib and A. D. Salman, “Design and develop authentication in electronic payment systems based on IoT and biometric,” vol. 20, no. 6, pp. 1297–1306, 2022, doi 10.12928/TELKOMNIKA.v20i6.22157.
I. M. Sukarsa, I. N. Piarsa, I. G. Bagus, and P. Putra, “Simple solution for low cost bandwidth management,” vol. 19, no. 4, pp. 1419–1427, 2021, doi 10.12928/TELKOMNIKA.v19i4.17109.
A. Ezugwu, E. Ukwandu, C. Ugwu, M. Ezema, C. Olebara, and J. Ndunagu, “Password-Based Authentication and The Experiences of End Users,” no. 2019.
A. H. Aly, A. Ghalwash, M. M. Nasr, and A. A. A. El-hafez, “Formal security analysis of lightweight authenticated key agreement protocol for IoT in cloud computing,” vol. 24, no. 1, pp. 621–636, 2021, doi: 10.11591/ijeecs.v24.i1.pp621-636
How to Cite
Copyright (c) 2023 Ignatius Agus Supriyono, Irwan Sembiring, Adi Setiawan, Iwan Setyawan, Theophilus Wellem, Henderi, Ilham Hizbuloh
This work is licensed under a Creative Commons Attribution 4.0 International License.
This journal permits and encourages authors to post items submitted to the journal on personal websites while providing bibliographic details that credit its publication in this journal.
Authors are permitted to post their work online in institutional/disciplinary repositories or on their own websites. Pre-print versions posted online should include a citation and link to the final published version in Journal of Librarianship and Scholarly Communication as soon as the issue is available; post-print versions (including the final publisher's PDF) should include a citation and link to the journal's website.