CFP last date
22 April 2024
Reseach Article

An Analytical and Experimental Study of AAA Model with Special Reference to RADIUS and TACACS+

by Arun Pratap Singh Sikarwar, Preeti Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 169 - Number 9
Year of Publication: 2017
Authors: Arun Pratap Singh Sikarwar, Preeti Saxena
10.5120/ijca2017914870

Arun Pratap Singh Sikarwar, Preeti Saxena . An Analytical and Experimental Study of AAA Model with Special Reference to RADIUS and TACACS+. International Journal of Computer Applications. 169, 9 ( Jul 2017), 6-10. DOI=10.5120/ijca2017914870

@article{ 10.5120/ijca2017914870,
author = { Arun Pratap Singh Sikarwar, Preeti Saxena },
title = { An Analytical and Experimental Study of AAA Model with Special Reference to RADIUS and TACACS+ },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 169 },
number = { 9 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume169/number9/28011-2017914870/ },
doi = { 10.5120/ijca2017914870 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:16:55.913413+05:30
%A Arun Pratap Singh Sikarwar
%A Preeti Saxena
%T An Analytical and Experimental Study of AAA Model with Special Reference to RADIUS and TACACS+
%J International Journal of Computer Applications
%@ 0975-8887
%V 169
%N 9
%P 6-10
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A significant growth is observed in network technology during last few decades. Several kinds of information services are delivered using the networks. Additionally, both legitimate and malicious users are accessing the services. Moreover, the network is always vulnerable to different kinds of security issues. Therefore the domain of security is an essential aspect of the study, research, and development. For that purpose, the efforts are made to design effective security protocols. During effective security protocol design, the authentication, authorization, and accounting of network access are a key concern. The ability of network security design is well known as AAA model. This presented work investigates about the two popular network security protocols namely RADIUS and TACACS+ to deploy AAA model. Evaluation and comparison of both the security techniques and simulation methodologies are involved in the presented work.

References
  1. Daniel Granlund, “Secure and Scalable Roaming Support in Heterogeneous Access Networks”, Thesis, Mobile Systems Department of Computer Science and Electrical Engineering Luleå University of Technology, January 2011
  2. Hasan, A., Jahnert, J., Zander, S. and Stiller, B., “Authentication, Authorization, Accounting and Charging for the Mobile Internet” Mobile Summit (September 2001).
  3. Jiange Zhang, Yuanbo Guo, Yue Chen, Jun Ma, “Research of AAA messages Based on 802.1x Authentication”, Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 19-20 Dec. 201,Chongqing, China, IEEE
  4. Jindrich Jelinek and Pavel Satrapa, Jiri Fiser, “Experimental Issues of the Model of the Enhanced RADIUS Protocol”, IEEE International Workshop of Electronics, Control, Measurement, Signals and their Application to Mechatronics (ECMSM), 2015
  5. Gabriel-Cătălin Cristescu, Victor Croitoru, Vlad Sorici, “Implementing an AAA-RADIUS Solution Based on Legacy Authentication Protocols”, 12th International Symposium on Electronics and Telecommunications (ISETC), 2016, Timisoara, Romania, 27-28 Oct. 2016, IEEE
  6. Nisha Bawaria, Kamlesh Namdeo, Pankaj Richhariya, “High-Performance AAA Security for Cloud Computing in Hierarchical Model”, International Journal of Computer Applications (0975 – 8887) Volume 132 – No.15, December 2015
  7. Daniel Granlund, Christer Åhlund, “A Scalability Study of AAA Support in Heterogeneous Networking Environments with Global Roaming Support”,  10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011, 16-18 Nov. 2011, Changsha, China IEEE
  8. The Advantages of TACACS+ for Administrator Authentication, TACACS.net document, 2011, available at http://www.tacacs.net/docs/TACACS_Advantages.pdf.
Index Terms

Computer Science
Information Sciences

Keywords

AAA Model TACACS+ RADIUS Comparative study performance analysis implementation.