Main Article Content
Abstract
This research explains the primary role of the RADIUS security server in wireless LAN networks using AAA security techniques, which control user access. An experimental research method and literature review were used to collect information. By using the RADIUS server, any user who wants to connect to the local wireless network must install a private certificate on their device and provide a username and password within the server's domain to connect to the wireless network. Each user needs a separate username and password, preventing unauthorized access to wireless LAN devices. The authentication and authorization processes are not performed by the access point but are instead handled by the RADIUS server, located at a central access point, providing a high level of security.
Keywords
Article Details
Copyright (c) 2024 Reserved for Kabul University.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
- R.Egli P. AAA / RADIUS REMOTE AUTHENTICATION. 2015;1–12.
- Pratap A, Saxena P. An Analytical and Experimental Study of AAA Model with Special Reference to RADIUS and TACACS+. Int J Comput Appl. 2017;169(9):6–10.
- Kumkar V, Tiwari A, Tiwari P, Gupta A, Shrawne S. Vulnerabilities of Wireless Security protocols (WEP and WPA2). Int J Adv Res Comput Eng Technol. 2012;1(2) :2278–1323.
- Vinay Kumar SB, Prasanna Kumar C, Shahi B, Jha D, Monica B V., Suresh Kumar CP. Role of Diameter Based Protocol in enhancing of new and Upcoming Technologies. Phys Procedia. 2016;78:415–22.
- Garais G. Cost Effective RADIUS Authentication for Wireless Clients. Database Syst J. 2010;1(2):27–32.
- Zou Y, Zhu J, Wang X, Hanzo L. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc IEEE. 2016;104(9):1727–65.
- Fonseca J, Seixas N, Vieira M, Madeira H. A Survey on Wireless Security Protocols (WEP, WPA and WPA2. IEEE Trans Dependable Secur Comput. 2014;11(2):4.
- Dmitry O. RADIUS server as centralized authentication. 2015;(May).
- Ravi V, Sunitha NR, Pradeep R, Verma S. Formal methods to verify authentication in TACACS+ protocol. 2017 2nd Int Conf Emerg Comput Inf Technol ICECIT 2017. 2018;1–4.
- Chhabra N. Comparative Analysis of Diferent Wireless Technologies. 2013;1(5).
- Differences P. The Advantages of TACACS + for Administrator Authentication. 2011;1–6.
- Deshmukh R V. Flapping RADIUS accounting server behavior with toggle-timer. Proc - 2012 7th Int Conf Broadband, Wirel Comput Commun Appl BWCCA 2012. 2012;558–61.
- Barhoom TSM. Implementation and Comparison of OTP Techniques (TOTP,HOTP,CROTP) to Prevent Replay Attack in RADIUS Protocol. 2014.
- Rehman MH, Govardhan DA, Narayana Rao TV. Design and Implementation of RADIUS – An Network Security Protocol GJCST Computing Classification. 2014;10(October 2014):48–54.
- Mishra Y, Marwah GK, Verma S. Arduino Based Smart RFID Security and Attendance System with Audio Acknowledgement. 2015;4(01):363–7.
- Keski-kasari S, Huhtanen K, Harju J. Applying Radius-based Public Access Roaming in the Finnish University Network ( FUNET ). :1–11.
- Zhou J, Yan Y, Wang L, Guo Y. Comparative Analysis and Application of Common Authentication and Accounting Technology in the Modern Network. www.ijape.org Int J Autom Power Eng. 2013;2(4):84–9.
- Paramitha AP, Rochim AF, Fauzi A. Design and Implementation Network Administrators Account Management System Based on Authentication, Authorization, and Accounting Based on TACACS and LDAP. IOP Conf Ser Mater Sci Eng. 2020;803(1).
- Weissman D, Jayasumana A. Integrating IoT Monitoring for Security Operation Center. In: GIoTS 2020 - Global Internet of Things Summit, Proceedings. 2020.
References
R.Egli P. AAA / RADIUS REMOTE AUTHENTICATION. 2015;1–12.
Pratap A, Saxena P. An Analytical and Experimental Study of AAA Model with Special Reference to RADIUS and TACACS+. Int J Comput Appl. 2017;169(9):6–10.
Kumkar V, Tiwari A, Tiwari P, Gupta A, Shrawne S. Vulnerabilities of Wireless Security protocols (WEP and WPA2). Int J Adv Res Comput Eng Technol. 2012;1(2) :2278–1323.
Vinay Kumar SB, Prasanna Kumar C, Shahi B, Jha D, Monica B V., Suresh Kumar CP. Role of Diameter Based Protocol in enhancing of new and Upcoming Technologies. Phys Procedia. 2016;78:415–22.
Garais G. Cost Effective RADIUS Authentication for Wireless Clients. Database Syst J. 2010;1(2):27–32.
Zou Y, Zhu J, Wang X, Hanzo L. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc IEEE. 2016;104(9):1727–65.
Fonseca J, Seixas N, Vieira M, Madeira H. A Survey on Wireless Security Protocols (WEP, WPA and WPA2. IEEE Trans Dependable Secur Comput. 2014;11(2):4.
Dmitry O. RADIUS server as centralized authentication. 2015;(May).
Ravi V, Sunitha NR, Pradeep R, Verma S. Formal methods to verify authentication in TACACS+ protocol. 2017 2nd Int Conf Emerg Comput Inf Technol ICECIT 2017. 2018;1–4.
Chhabra N. Comparative Analysis of Diferent Wireless Technologies. 2013;1(5).
Differences P. The Advantages of TACACS + for Administrator Authentication. 2011;1–6.
Deshmukh R V. Flapping RADIUS accounting server behavior with toggle-timer. Proc - 2012 7th Int Conf Broadband, Wirel Comput Commun Appl BWCCA 2012. 2012;558–61.
Barhoom TSM. Implementation and Comparison of OTP Techniques (TOTP,HOTP,CROTP) to Prevent Replay Attack in RADIUS Protocol. 2014.
Rehman MH, Govardhan DA, Narayana Rao TV. Design and Implementation of RADIUS – An Network Security Protocol GJCST Computing Classification. 2014;10(October 2014):48–54.
Mishra Y, Marwah GK, Verma S. Arduino Based Smart RFID Security and Attendance System with Audio Acknowledgement. 2015;4(01):363–7.
Keski-kasari S, Huhtanen K, Harju J. Applying Radius-based Public Access Roaming in the Finnish University Network ( FUNET ). :1–11.
Zhou J, Yan Y, Wang L, Guo Y. Comparative Analysis and Application of Common Authentication and Accounting Technology in the Modern Network. www.ijape.org Int J Autom Power Eng. 2013;2(4):84–9.
Paramitha AP, Rochim AF, Fauzi A. Design and Implementation Network Administrators Account Management System Based on Authentication, Authorization, and Accounting Based on TACACS and LDAP. IOP Conf Ser Mater Sci Eng. 2020;803(1).
Weissman D, Jayasumana A. Integrating IoT Monitoring for Security Operation Center. In: GIoTS 2020 - Global Internet of Things Summit, Proceedings. 2020.