Selection of an EAP authentication method for a WLAN

نویسندگان

  • Khidir M. Ali
  • Thomas J. Owens
چکیده

IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks. Any one of these authentication methods can be the ideal choice for a specific networking environment. The fact that IEEE 802.11i leaves the selection of the most suitable authentication method to system implementers makes the authentication framework more flexible, but on the other hand leads to the question of how to select the authentication method that suits an organisation’s requirements and specific networking environment. This paper gives an overview of EAP authentication methods and provides a table comparing their properties. It then identifies the crucial factors to be considered when employing EAP authentication methods in WLAN environments. The paper presents algorithms that guide the selection of an EAP-authentication method for a WLAN and demonstrates their application through three examples.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is developing, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Enhancing WLAN Security by Introducing EAP-TLS Smartcards

Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-TLS protocol in smartcards. It introduces also the Pre-SharedKey protocol (PSK), a lightweight identity authentication for access control and key calculation and distribution within WLAN security. The performance and t...

متن کامل

Implementation of Extensible Authentication Protocol in OPNET Modeller

As wireless technology is becoming more and more prevalent; security in such networks is becoming a challenging issue and is in great demand. One of the most powerful tools in this area which helps to simulate and evaluate the behaviour of networks and protocols is OPtimised Network Engineering Tool (OPNET). Although OPNET has covered a wide range of models and a variety of protocols, there is ...

متن کامل

Performance Evaluation of the Fast Authentication Schemes in GSM-WLAN Heterogeneous Networks

In GSM-WLAN heterogeneous networks, the authentication efficiency is one of the drawbacks for message transaction and processing in the RADIUS server. This paper proposed two fast authentication schemes, based on the EAP-SIM mechanism, to improve the authentication efficiency by balancing the message transaction loads and processing loads among the RADIUS server and individual APs. In this pape...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJICS

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2007