A Proof-of-Concept Implementation of EAP-TLS with TPM Support

نویسندگان

  • Carolin Latze
  • Ulrich Ultes-Nitsche
چکیده

Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 networks and 2G: the missing standardized login process. While the 2G standard covers all aspects of the communication process, first IEEE 802.11 standards only targeted the data transmission. Due to this lack of standards for authentication, the login process and the missing secure subscriber identification, a number of different, mostly incompatible, login procedures have been established that are all far away from being as usable, comfortable and secure as 2G methods. This is why the authors of this paper propose to use EAP-TLS, which is a well established, secure and scalable authentication protocol, in combination with identities provided by a Trusted Platform Module (TPM) in order to archieve a high comfort for the user This paper describes the concept, presents a Linux based implementation, and evaluates the approach in a testbed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing WLAN Security by Introducing EAP-TLS Smartcards

Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-TLS protocol in smartcards. It introduces also the Pre-SharedKey protocol (PSK), a lightweight identity authentication for access control and key calculation and distribution within WLAN security. The performance and t...

متن کامل

Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters

We investigate how to safely export additional cryptographic keys from secure channel protocols, modelled with the authenticated and confidential channel establishment (ACCE) security notion. For example, the EAP-TLS protocol uses the Transport Layer Security (TLS) handshake to output an additional shared secret which can be used for purposes outside of TLS, and the RFC 5705 standard specifies ...

متن کامل

Status of this Memo PPP EAP TLS Authentication Protocol

PPP EAP TLS Authentication Protocol Status of this Memo This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. 1. Abstract The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams ove...

متن کامل

Network Working Group Eap-tls Authentication Protocol

The EAP-TLS Authentication Protocol Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstr...

متن کامل

A Modular Correctness Proof of IEEE 802.11i and SSL/TLS

The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices, prior to user connectivity. The protocol consists of several parts, including an 802.1X authentication phase allowing TLS over EAP, the 4-Way Handshake to establish a fresh session key, and an optional Group Key Handshake for group communications. Motivated by previous v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008