Literature Review on EAP Methods
Abstract
Keywords
Full Text:
PDFReferences
B. Adoba, L. Blunk, J. Vollbrecht, J. Carlson, and E. Levkowetz, “ Extensible Authentication Protocol (EAP),” RFC 3748, June 2004.
Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11Wireless LANs 2011Chun-I Fan∗, Member, IEEE, Yi-Hui Lin, and Ruei-Hau Hsu
RFC 4017, IETF Request for Comments, "EAP Method Requirements for Wireless LANs", D. Stanley, J. Walker and B. Aboba, March 2005
NIST Special Publication 800-120 Recommendation for EAP Methods Used in Wireless Network Access Authentication Katrin Hoeper and Lily Chen
Authentication Protocol Transport Layer Security Deployment Guide for Wireless LAN Networks white paper
B. Adoba, D. Simon, and R. Hurst, “The EAP-TLS Authentication Protocol,”RFC 5216, March 2008.
EAP method for 802.11 wireless LAN security web proforum tutorials THE INTERNATIONAL engineering consortium
N. Cam-Winget, D. McGrew, J. Salowey, and H. Zhou, “The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method(EAP-FAST),” RFC 4851, May 2007.
M. Badra and P. Urien, “EAP-Double-TLS Authentication Protocol,”http://tools.ietf.org/html/draft-badra-eap-double-tls-04, October 2005
IEEE Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Selection of an EAP authentication method for a WLAN
N. Cam-Winget, D. McGrew, J. Salowey, and H. Zhou, “The Flexible Authenticationvia Secure Tunneling Extensible Authentication Protocol Method(EAP-FAST),” RFC 4851, May 2007.
J. C. Chen, M. C. Jiang, and Y. W. Liu, “Wireless LAN Security and IEEE802.11i,” IEEE Wireless Communications, Vol. 12, pp. 27-36, 2005.
J. Chen and Y. Wang, “Extensible Authentication Protocol (EAP) and IEEE802.1x tutorial and empirical experience,” IEEE Communications Magazine,Vol. 43, No. 12, pp. 26-32, 2005.
P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese, “IEEE 802.1X Remote Authentication Dial in User Service (RADIUS),” RFC 3580, September 2003.
M. T. Dandjinou, P. Urien, “EAP-SSC Protocol,” 3rd International Conference on Networking ICN’04
R. Dantu, G. Clothier, and A. Atri, “EAP Methods for Wireless Networks”,Computer Standards & Interfaces Vol. 29, No. 3, pp. 289-301, March 2007.
T. Dierks and C. Allen, “The TLS Protocol Version 1.0,” RFC 2246, January1999.
T. Dierks and E. Rescorla, “The TLS Protocol Version 1.2,” RFC 5246, August 2008.
P. Eronen and H. Tschofenig,“Pre-Shared Key Ciphersuites for Transport Layer Security (TLS),” RFC 4279, December 2005.
P. Funk and B. W. Simon: draft-funk-eap-ttls-v0-00.txt, “EAP Tunneled TLS Authentication Protocol Version 0 (EAP-TTLSv0),” IETF Draft, February2005.
M. Gast, 802.11 Wireless Network: The Definitive Guide, O’REILLY, 2002
R. Housley and W. Arbaugh, “Security Problems in 802.11-Based Networks,” Communications of the ACM, Vol. 46, No. 5, pp. 35-39, 2003
H. Hwang, G. Jung, K. Sohn, and S. Park, “A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP,” International Conference on Information Systems Security, pp. 164-170, 2008.
D. Jablon: draft-jablon-speke-02.txt, “The SPEKE Password-Based Key Agreement Methods,” IETF Draft, October 2003.
W. S. Juang and J. L. Wu, “Two Efficient Two-Factor Authenticated Key Exchange Protocols in Public Wireless LANs,” Computers and Electrical Engineering, pp. 33-40, 2009
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.