DOI QR코드

DOI QR Code

A Verification Case Study about the Authentication of a Network using AAA

AAA가 적용된 네트워크의 인증에 대한 검증 사례연구

  • Received : 2017.01.12
  • Accepted : 2017.04.24
  • Published : 2017.04.30

Abstract

AAA, an information-protective protocol authorizes the degree of service and rights to the user through a safe and reliable authentication. The protocol also systematically manages the accounting functions including billing, monitoring, and reporting using the user information. After a topology was created to design a network based on a router and server using RADIUS and TACACS+, a common virtual network was made using a packet tracker. This paper presents cases showing valid authentication through simulations.

AAA는 사용자에 대한 안전하고 신뢰성 있는 인증(Authentication)을 통해 사용자에게 주어진 권한과 서비스 수준을 결정하여 인가(Authorization)하고, 사용자 자원의 사용정보를 과금, 감사, 리포팅 등을 위한 계정관리(accounting) 기능을 체계적으로 통합 관리하는 정보보호 프로토콜이다. 본 논문에서는 RADIUS와 TACACS+가 적용된 라우터와 서버 기반의 네트워크를 설계하기 위해 토폴로지를 설계한 후 패킷 트레이서를 이용하여 공통 가상 망을 구현한 다음, 시뮬레이션을 통해서 인증에 대한 검증구현 사례를 제시하였다.

Keywords

References

  1. S. Ji, K. Han, and S. Park, "An Implementation of AAA for Next Generation Mobile Communications," Symp. of the Korean Institute of Communications and Information Sciences, July 2002, pp. 1962-1965.
  2. G. Jung, J. Song, H. Ryu, and H. Kim, "A study on Attribute Certificate Based AAA Protocol," Conf. of Korean Institute of Information Scientists and Engineers, Seoul, Korea, vol. 30, no. 2, Oct. 2003, pp. 739-741.
  3. D. Lee and I. Lee, "An AAA Design for Roaming on Ubiquitous Network," J. of Security Engineering, vol. 3, no. 1, Feb. 2006, pp. 55-61.
  4. D. Lee and K. Jeong, "A Study on Efficient AAA Using Attribute Certification," J. of Security Engineering, vol. 4, no. 1, Feb. 2007, pp. 41-57.
  5. T. Lakshmibai, B. Chandrasekaran, and C. Parthasarathy, "A Survey of Different Networks for Traffic Flow Control," J. of Int. Academic Research for Multidisciplinary, vol. 2, no. 5, June 2014, pp. 765-775.
  6. I. Yoon and J. Kim, Complete Conquest for Packet Tracer, Seoul: Kyung-Hee University Press, Jun., 2013.
  7. J. Jang and N. Kim, "The case study for Implementation and verification of Network based on VLSM," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 11, Dec. 2014, pp. 1267-1276. https://doi.org/10.13067/JKIECS.2014.9.11.1267
  8. N. Kim, "The case study for Implementation and verification of Dynamic NAT and PAT," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 10, Oct. 2015, pp. 1131-1137. https://doi.org/10.13067/JKIECS.2015.10.10.1131
  9. N. Kim, "The case study to verify of a network based on router applying an ACL(: Access List)," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 5, May 2016, pp. 491-498. https://doi.org/10.13067/JKIECS.2016.11.5.491