• DocumentCode
    244693
  • Title

    Server authentication for blocking unapproved WOW access

  • Author

    Lee, Wei-Jen ; Park, Simon S. H. ; Chasung Lim ; Jinho Kim ; Byeong-Soo Jeong

  • Author_Institution
    Ind. Eng., Inha Univ., Incheon, South Korea
  • fYear
    2014
  • fDate
    15-17 Jan. 2014
  • Firstpage
    155
  • Lastpage
    159
  • Abstract
    An interesting function named Wake on WLAN (WOW) has recently captured researchers attention as one of the remote computer administration functions that may turn on the remote computerized system through the network connection at the time point of receiving a specially coded packet. The phenomenon comes from the physiognomies of the coded packet such that each and every computerized system including smart-phones in the same network area receives the code where the transaction code will be broadcasted. Just in case predetermined a piece of coded packets from a server is acquired, not only authorized users but also unapproved user within the area network can wake the computerized system up. Therefore, there are pros and cons for the WOW functionalities: The one is that once the computerized system is awake, it is vulnerable for the unapproved WOW attacks or hackings so that the possibility of information leakage can be increased. The other is a good thing such that only the activated servers among the set of servers like server-farm can be woke up, so that by reducing the electricity power Green energy possibility can be achieved. In this research, a novel technique to block Unapproved WOW attacks resulting from involuntary switch-on of a computerized system has been exploited, so that the good points can be achieved by getting controllability for the weak points [13, 14].
  • Keywords
    authorisation; computer network security; green computing; network servers; power aware computing; telecommunication power management; wireless LAN; Green energy; WOW functionalities; Wake on WLAN; coded packet physiognomies; electricity power reduction; information leakage; network connection; remote computer administration functions; remote computerized system; server authentication; server-farm; smart-phones; specially coded packet; transaction code; unapproved WOW access blocking; unapproved WOW attacks; Authentication; Computers; IP networks; Servers; Switches; Wireless LAN; Coded packet; Green IT; Security; Unapproved WOW Attack; Wake on WLan;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Big Data and Smart Computing (BIGCOMP), 2014 International Conference on
  • Conference_Location
    Bangkok
  • Type

    conf

  • DOI
    10.1109/BIGCOMP.2014.6741427
  • Filename
    6741427