{"title":"基于端口的DHCP服务器设计和认证","authors":"Mehmet Korkmaz, Cemal Küse","doi":"10.1109/SIU.2017.7960334","DOIUrl":null,"url":null,"abstract":"In a large-scale network, the user authentication process is a high workload and has some security problems. In this study we propose a mechanism for each user that wants to be included in our enterprise network and authenticate oneself without needing to consult with any network administrator. We also propose to fix that user's binding location. So using this information we ensure security and determine IP configuration to clients for next connections.","PeriodicalId":217576,"journal":{"name":"2017 25th Signal Processing and Communications Applications Conference (SIU)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Port-based DHCP server design with authentication\",\"authors\":\"Mehmet Korkmaz, Cemal Küse\",\"doi\":\"10.1109/SIU.2017.7960334\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In a large-scale network, the user authentication process is a high workload and has some security problems. In this study we propose a mechanism for each user that wants to be included in our enterprise network and authenticate oneself without needing to consult with any network administrator. We also propose to fix that user's binding location. So using this information we ensure security and determine IP configuration to clients for next connections.\",\"PeriodicalId\":217576,\"journal\":{\"name\":\"2017 25th Signal Processing and Communications Applications Conference (SIU)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 25th Signal Processing and Communications Applications Conference (SIU)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIU.2017.7960334\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 25th Signal Processing and Communications Applications Conference (SIU)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIU.2017.7960334","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In a large-scale network, the user authentication process is a high workload and has some security problems. In this study we propose a mechanism for each user that wants to be included in our enterprise network and authenticate oneself without needing to consult with any network administrator. We also propose to fix that user's binding location. So using this information we ensure security and determine IP configuration to clients for next connections.