Online Access Control Solves Security Challenge

September 2009
Security: Solutions for Enterprise Security Leaders;Sep2009, Vol. 46 Issue 9, p70
Trade Publication
The article focuses on the efficient use of the online lockset to solve the problems on security management in the U.S. The use of the online lockset with WiFi infrastructure by Lehigh Career & Technical Insitute (LCTI) has been viewed to be beneficial because it has the capability to store 2,000 unique credential identification (ID). Moreover, the lockset provides a minimial reliance on network bandwidth.


Related Articles

  • Uni-MUMAC: a unified down/up-link MU-MIMO MAC protocol for IEEE 802.11ac WLANs. Liao, Ruizhi; Bellalta, Boris; Cao, Trang; Barcelo, Jaume; Oliver, Miquel // Wireless Networks (10220038);Jul2015, Vol. 21 Issue 5, p1457 

    Due to the dominance of the downlink traffic in Wireless Local Area Networks (WLANs), a large number of previous research efforts have been put to enhance the downlink transmission, namely, from the Access Point (AP) to stations (STAs). The downlink Multi-User Multiple-Input Multiple-Output...

  • A Novel End-shorted Printed Open Loop Antenna for IEEE 802.15 2.4 GHz Wireless Sensor Network Platform Applications. Lin, Yuan-Chih; Hung, Tzu-Chen; Lin, Chii-Ruey // Wireless Personal Communications;Jul2011, Vol. 59 Issue 1, p135 

    In this paper, a novel antenna design with a coupling feeding mechanism for WSN applications at IEEE 802.15 2.4 GHz operation has presented and implemented. By adjusting coupling element, impedance matching for RF input 50 ohm can be obtained. By tuning the length of the resonant strip, resonant...

  • Philly's Controversial Wi-Fi Plan. Rockwell, Mark // Wireless Week;5/15/2005, Vol. 11 Issue 11, p10 

    Reports on the plan of the city of Philadelphia, Pennsylvania to roll out a municipal Wireless-Fidelity (Wi-Fi) network. Approximate cost of high-bandwidth connections to be provided to Philadelphia residents; Operations of the nonprofit corporation Wireless Philadelphia created by the city;...

  • Delay Analysis of an Enhancing IEEE 802.11 Point Coordination Function MAC Protocol. Zheng Guan; Hongwei Ding; Wenhua Qian // Journal of Networks;May2014, Vol. 9 Issue 5, p1223 

    The widespread use of multimedia networking applications has brought more requirements to the network, creating a need for end-to-end Quality of Service (QoS). The contention-free Point Coordination Function (PCF) with Round Robin scheme, where the Access Point controls all transmissions based...

  • Relay-volunteered multi-rate cooperative MAC protocol for IEEE 802.11 WLANs. Kim, Jin-Seong; Oh, Chang-Yeong; Lee, Tae-Jin // Wireless Networks (10220038);Nov2013, Vol. 19 Issue 8, p1945 

    In IEEE 802.11, the rate of a station (STA) is dynamically determined by link adaptation. Low-rate STAs tend to hog more channel time than high-rate STAs due to fair characteristics of carrier sense multiple access/collision avoidance, leading to overall throughput degradation. It can be...

  • Secure Fast Pre-authentication Based on IEEE 802.11i. HUNG-YU CHIEN; YUAN-LIANG TANG; TZU-HANG HSU // International MultiConference of Engineers & Computer Scientists;2007, p1325 

    User mobility in WLANs becomes more and more popular because of the wide deployment of WLANs and numerous applications on it. Some of these applications, for example multimedia applications, require fast handoffs among access points to maintain the quality of service. In order to support...

  • A resource management framework for 802.11 wireless access networks. Fonseca, Mauro; Munaretto, Anelise; Mendes, Christian; Chaouchi, Hakima // Wireless Networks (10220038);Aug2015, Vol. 21 Issue 6, p1891 

    This article proposes a management framework for shared resources in wireless access networks in a dynamic and adaptive manner without requiring any modifications to end devices. Our proposal is based on the RTS/CTS mechanism according to the IEEE 802.11 standard. We implement an extension of...

  • AUTOMATION FRAMEWORK FOR ROGUE ACCESS POINT MITIGATION IN IEEE 802.1X-BASED WLAN. HERMADUANTI, NINKI; RIADI, IMAM // Journal of Theoretical & Applied Information Technology;11/30/2016, Vol. 93 Issue 2, p287 

    Wi-Fi hotspot is a product of wireless network technology than can be easily found in public places such as airport, café, or shopping mall. Besides offering ease in connection, the use of wireless network technology is also raises security issue because it lies in an open or public area....

  • Access Authentication Scheme Based on Authorized Certificate in Wireless Mesh Networks. Liangyu Luan; Yingfang Fu; Peng Xiao // Journal of Networks;Jan2014, Vol. 9 Issue 1, p231 

    The main benefits of the access authentication in IEEE 802.11s are both easy administration of the subscribers and compatibility with IEEE 802.11i. However, there still exist some shortcomings, such as worse authentication delay, suffering from intermediate attack, lower expansibility and the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics