Computer-Based Local Area Authentication System

O. S. Omorogiuwa*, G. O. Aziken**
*Professor,Department of Electrical and Electronic Engineering, University OF Benin, Benin City, Edo State, Nigeria.
**Professor, Department of Information and Communication Technology, University of Benin, Benin city, Edo State, Nigeria.
Periodicity:September - November'2018
DOI : https://doi.org/10.26634/jcom.6.3.15695

Abstract

A Computer Based Test (CBT) Local Area Network (LAN) security center was developed using XAMPP (Cross-Platform Apache MariaDB PHP and Perl) integrated net-base application and JAVA object-oriented programming language, using a backend Oracle database (JBuilder and NetBeans) where the Media Access Control (MAC) address of the users will be saved and using hard to spoof measure that is correlated to location of LAN to prevent MAC address spoof. This security system is controlled through the network via the server and controls all clients that choose to use the resources like e-exam platform, e-library, etc. It also views the activities of the users in the network (surveillance system). The security system also keeps history/records of all detection sensor/ MAC address of users, to track any activities carried with the resources. The performance under test was found to be satisfactory, as all unauthorized users are blocked and appropriate warning messages are sent to the client's system by the server when the user attempts to login. This eliminates external users from gaining access to the examination platform.

Keywords

MAC, Security Systems, Examination, Authentication

How to Cite this Article?

Omorogiuwa,O.S., Aziken,G.O.(2018)Computer-Based Local Area Authentication System, i-manager's Journal on Computer Science, 6(3),1-6. https://doi.org/10.26634/jcom.6.3.15695

References

[1]. Al, A., & Abu, Q. (2013). IRS for Computer Character Sequences Filtration: a new software tool and algorithm to support the IRS at tokenization process. International Journal of Advanced Computer Science and Applications, 4(2), 81-85.
[2]. Alotaibi, B., & Elleithy, K. (2016). A new mac address spoofing detection technique based on random forests. Sensors, 16(3), 281.
[3]. Beaver, K. (2013). Hacking for Dummies (4th Ed.). USA: John Wiley & Sons.
[4]. Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2015). Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials, 18(1), 184-208.
[5]. Okon, E. O., & Samson, D. D. (2015). Software quality and usability for computer-based test in tertiary institution in nigeria: A case study of Kogi State University. American Journal of Educational Research, 3(10), 1224-1229.
[6]. Omorogiuwa, O., & Nwuko, F. N. (2017). Design and implementation of a computer based test centre using biometric for authentication. American Journal of Advanced Research, 1(1), 13-18.
[7]. Omorogiuwa, O. S., & Anyasi, F. I. (2016). An improved means to guild campus based network resources (security system), Journal of Engineering Science and Application (JESA), 9 (1), 43-49.
[8]. Parmar, K., & Jinwala, D. C. (2014, August). Aggregate MAC based authentication for secure data aggregation in wireless sensor networks. In International Conference on Intelligent Computing (pp. 475-483). Springer, Cham.
[9]. Saliu, A. M., Kolo, M. I., Muhammad, M. K., & Nafiu, L. A. (2013). Internet authentication and billing (hotspot) system using MikroTik router operating system. International Journal of Wireless Communications and Mobile Computing, 1(1), 51-57.
[10]. Samra, A. A., & Abed, R. (2010). Enhancement of passive mac spoofing detection techniques. International Journal of Advanced Computer Science and Applications, 1(5), 108-116.
[11]. Todorov, D. (2007). Mechanics of User Identification and Authentication: Fundamentals of Identity Management. USA: Auerbach Publications.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.