EAP-based Authentication with EAP Method Selection Mechanism

M.A.C., Bhakti and Azween, Abdullah and Low, Tan Jung (2007) EAP-based Authentication with EAP Method Selection Mechanism. In: International Conference on Intelligent and Advanced Systems (ICIAS 2007), November 2007, K.L.

[thumbnail of ICIAS_2007_Final_(PID498323).pdf] PDF
ICIAS_2007_Final_(PID498323).pdf
Restricted to Registered users only

Download (185kB)

Abstract

Wireless network has grown rapidly in the past few
years due to its advantages over the wired network, such as
mobility, flexibility, convenience, and rapid deployment. But it
also introduces new security issues due to its nature, i.e. it does
not need any physical access. One of the solutions to overcome the
limitation of wireless network security is the IEEE 802.1X
specification, a mechanism for port-based network access control,
which is based on Extensible Authentication Protocol (EAP), an
authentication framework that can support multiple
authentication methods. We propose extension to the EAP
framework for authentication method selection purpose, in order
to reduce the number of fail authentication due to unsuitable EAP
method used for the authentication. The selection will be based on
some criteria such as the node resources, previous authentication
and communication recor

Item Type: Conference or Workshop Item (Paper)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Departments / MOR / COE: Departments > Computer Information Sciences
Depositing User: Assoc Prof Dr Azween Abdullah
Date Deposited: 12 Mar 2010 07:32
Last Modified: 19 Jan 2017 08:26
URI: http://scholars.utp.edu.my/id/eprint/711

Actions (login required)

View Item
View Item