Abstract

Computer programs that radio amateurs use in their digital networks give various opportunities for checking user authentication before allowing access to sensitive parts of communication systems. Those systems include not only email servers that handle amateur radio messaging and file exchange, but also include radio-relay networks of digital repeaters that operate in big cities, or in rural and remote locations. This chapter summarizes results of experiments performed in real amateur packet radio networks as well as those provided by simulations with amateur radio software in local area networks. Our intention was to test security in accessing e-mail servers and radio relay systems within the average amateur radio digital infrastructure. This study suggests various methods which aim is to bridge the gap between the improved safety, and eventual discomfort in regular end-user’s and system administrator’s activities. We focused our work to the following challenges: user authentication in amateur radio email servers; key management, i.e. obtaining, installing, and renewing secret documents (‘keys’) in between end-users and system administrators; encryption of email content and user passwords; attacks, epidemics, and appropriate countermeasures; and other protective actions that increase the security and satisfaction in average network participants. Described methods will help practitioners, students and teachers in computer science and communication technologies in implementing exciting amateur radio wireless opportunities within educational computer networks, as well as in planning new telecommunication systems.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call