Implementation of Extensible Authentication Protocol in OPNET Modeller

نویسندگان

  • S. Saed Rezaie
  • S. Amir Hoseini
  • H. Taheri
چکیده

As wireless technology is becoming more and more prevalent; security in such networks is becoming a challenging issue and is in great demand. One of the most powerful tools in this area which helps to simulate and evaluate the behaviour of networks and protocols is OPtimised Network Engineering Tool (OPNET). Although OPNET has covered a wide range of models and a variety of protocols, there is no implementation of security in it. In this paper we implement and simulate Extensible Authentication Protocol (EAP) using discrete event simulator OPNET modeller. EAP is an authentication framework which is compatible with IEEE 802.1x the security framework for IEEE 802 family. Keywords-WLAN; Security; Authentication; EAP; OPNET;

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is developing, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-...

متن کامل

Analysis of the Protected Extensible Authentication Protocol

The Internet Engineering Task Force (IETF) has proposed new protocols for highly secured wireless networking. The purpose of this paper is to implement one such proposed security protocol PEAP (Protected Extensible Authentication Protocol) [1]. PEAP was jointly developed by Microsoft, Cisco and RSA security. The protocol implementation is done on the server end of a Client/Server network model ...

متن کامل

Implementation of EAP authentication into IKEv2 protocol

IKEv2 is a protocol for exchanging keys in the IPsec architecture. In it's specification, EAP was proposed as one of the authentication mechanisms. EAP is extensible authentication protocol based on client/server architecture and allows introduction of additional EAP methods. Implementation of this protocol is complex and in our project it was decided to include one of the existing implementati...

متن کامل

Modelling Mobile User Behaviour for Future Wireless Networks Using OPNET Modeller Modelling Mobile User Behaviour for Future Wireless Networks Using OPNET Modeller

This paper presents a new mathematical framework of a Scalable Mobility Model (SMM) to characterise user movement behaviour, which can be applied to a wide number of network scenarios ranging from Local Area Networks (LAN) to Wide Area Networks (WAN). The core technique to describe the spatial and temporal behaviour of mobile users is the introduction of a novel concept referred to as Pole of G...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011