Simulation of EAP Method Selection and Negotiation Mechanism

M.A.C., Bhakti and Azween, Abdullah and Low , Tan Jung (2008) Simulation of EAP Method Selection and Negotiation Mechanism. In: International Symposium on Information Technology 2008, ITSim, 26 August 2008 through 29 August 2008, Kuala Lumpur.

[img] PDF
Restricted to Registered users only



Authentication is an important aspect in network security, especially in wireless network where unauthorized user can gain access to the network without any physical access. One of the authentication protocols that have been used in wireless networks is the Extensible Authentication Protocol (EAP). This paper discusses the simulation development and simulation results of a mechanism to select and negotiate the suitable EAP method to be used in EAP authentication between two nodes

Item Type:Conference or Workshop Item (Paper)
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Departments / MOR / COE:Departments > Computer Information Sciences
ID Code:704
Deposited By: Assoc Prof Dr Azween Abdullah
Deposited On:12 Mar 2010 02:43
Last Modified:19 Jan 2017 08:26

Repository Staff Only: item control page

Document Downloads

More statistics for this item...