Open Access Open Access  Restricted Access Subscription or Fee Access

Literature Review on EAP Methods

Anupama Patil, Sameer Nagtilak, Shweta Mane


Extensible Authentication Protocol (EAP), defined in RFC3748 [1], is a flexible authentication framework that has been frequently utilized in WLANs. For IEEE 802.11, WPA and WPA2 have utilized EAP as their authentication mechanisms, such as EAP-TLS, EAP-TTLS, and EAP-SIM. A network administrator can appropriately choose a desired authentication mechanism, called an EAP method. In this paper we have discussed different EAP methods & its implementation, application .There are different requirements of EAP methods defined in RFC3748 which are partially or fully satisfied by these methods. These methods are widely used in authentication for wireless network. There are several vendor specific methods which are simpler and satisfy the requirements in RFC3748.



Full Text:



B. Adoba, L. Blunk, J. Vollbrecht, J. Carlson, and E. Levkowetz, “ Extensible Authentication Protocol (EAP),” RFC 3748, June 2004.

Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11Wireless LANs 2011Chun-I Fan∗, Member, IEEE, Yi-Hui Lin, and Ruei-Hau Hsu

RFC 4017, IETF Request for Comments, "EAP Method Requirements for Wireless LANs", D. Stanley, J. Walker and B. Aboba, March 2005

NIST Special Publication 800-120 Recommendation for EAP Methods Used in Wireless Network Access Authentication Katrin Hoeper and Lily Chen

Authentication Protocol Transport Layer Security Deployment Guide for Wireless LAN Networks white paper

B. Adoba, D. Simon, and R. Hurst, “The EAP-TLS Authentication Protocol,”RFC 5216, March 2008.

EAP method for 802.11 wireless LAN security web proforum tutorials THE INTERNATIONAL engineering consortium

N. Cam-Winget, D. McGrew, J. Salowey, and H. Zhou, “The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method(EAP-FAST),” RFC 4851, May 2007.

M. Badra and P. Urien, “EAP-Double-TLS Authentication Protocol,”, October 2005

IEEE Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Selection of an EAP authentication method for a WLAN

N. Cam-Winget, D. McGrew, J. Salowey, and H. Zhou, “The Flexible Authenticationvia Secure Tunneling Extensible Authentication Protocol Method(EAP-FAST),” RFC 4851, May 2007.

J. C. Chen, M. C. Jiang, and Y. W. Liu, “Wireless LAN Security and IEEE802.11i,” IEEE Wireless Communications, Vol. 12, pp. 27-36, 2005.

J. Chen and Y. Wang, “Extensible Authentication Protocol (EAP) and IEEE802.1x tutorial and empirical experience,” IEEE Communications Magazine,Vol. 43, No. 12, pp. 26-32, 2005.

P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese, “IEEE 802.1X Remote Authentication Dial in User Service (RADIUS),” RFC 3580, September 2003.

M. T. Dandjinou, P. Urien, “EAP-SSC Protocol,” 3rd International Conference on Networking ICN’04

R. Dantu, G. Clothier, and A. Atri, “EAP Methods for Wireless Networks”,Computer Standards & Interfaces Vol. 29, No. 3, pp. 289-301, March 2007.

T. Dierks and C. Allen, “The TLS Protocol Version 1.0,” RFC 2246, January1999.

T. Dierks and E. Rescorla, “The TLS Protocol Version 1.2,” RFC 5246, August 2008.

P. Eronen and H. Tschofenig,“Pre-Shared Key Ciphersuites for Transport Layer Security (TLS),” RFC 4279, December 2005.

P. Funk and B. W. Simon: draft-funk-eap-ttls-v0-00.txt, “EAP Tunneled TLS Authentication Protocol Version 0 (EAP-TTLSv0),” IETF Draft, February2005.

M. Gast, 802.11 Wireless Network: The Definitive Guide, O’REILLY, 2002

R. Housley and W. Arbaugh, “Security Problems in 802.11-Based Networks,” Communications of the ACM, Vol. 46, No. 5, pp. 35-39, 2003

H. Hwang, G. Jung, K. Sohn, and S. Park, “A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP,” International Conference on Information Systems Security, pp. 164-170, 2008.

D. Jablon: draft-jablon-speke-02.txt, “The SPEKE Password-Based Key Agreement Methods,” IETF Draft, October 2003.

W. S. Juang and J. L. Wu, “Two Efficient Two-Factor Authenticated Key Exchange Protocols in Public Wireless LANs,” Computers and Electrical Engineering, pp. 33-40, 2009


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.