Open Access   Article Go Back

A Comparitive Analysis of EAP Authentication Mechanism for WLAN

Yogesh Singare1 , Manish Tembhurkar2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-1 , Page no. 43-48, Jan-2015

Online published on Jan 31, 2015

Copyright © Yogesh Singare , Manish Tembhurkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Yogesh Singare , Manish Tembhurkar, “A Comparitive Analysis of EAP Authentication Mechanism for WLAN,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.43-48, 2015.

MLA Style Citation: Yogesh Singare , Manish Tembhurkar "A Comparitive Analysis of EAP Authentication Mechanism for WLAN." International Journal of Computer Sciences and Engineering 3.1 (2015): 43-48.

APA Style Citation: Yogesh Singare , Manish Tembhurkar, (2015). A Comparitive Analysis of EAP Authentication Mechanism for WLAN. International Journal of Computer Sciences and Engineering, 3(1), 43-48.

BibTex Style Citation:
@article{Singare_2015,
author = {Yogesh Singare , Manish Tembhurkar},
title = {A Comparitive Analysis of EAP Authentication Mechanism for WLAN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {43-48},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=359},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=359
TI - A Comparitive Analysis of EAP Authentication Mechanism for WLAN
T2 - International Journal of Computer Sciences and Engineering
AU - Yogesh Singare , Manish Tembhurkar
PY - 2015
DA - 2015/01/31
PB - IJCSE, Indore, INDIA
SP - 43-48
IS - 1
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2945 2595 downloads 2599 downloads
  
  
           

Abstract

In recent years, WLANs have been developing rapidly and are increasingly being used in many applications. The extensive application of WLAN has been using an authentication framework widely called as Extensible Authentication Protocol (EAP). The requirements for EAP methods (i.e. Authentication mechanisms built on EAP) in WLAN authentication have been defined in RFC 4017 are issues also increasingly receiving widespread attention. To achieve user efficiency and robust security, lightweight computation and forward secrecy, not included in RFC 4017, are also desired in WLAN authentication. However, all EAP methods and authentication protocols designed for WLANs so far do not satisfy all of the above properties. With detailed analysis of all EAP Methods and authentication protocols designed for WLANs, this article pointed out properties of all EAP method.

Key-Words / Index Term

EAP Method, Authentication, WLAN

References

[1] Chun-I Fan, Yi-Hui Lin, and Ruei-Hau Hsu “Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs” Ieee Transactions On Parallel And Distributed Systems, Vol. 24, No. 4, April 2013.
[2] Liang, Jian Qiao, and Xuemin (Sherman) Shen,” PARK: A Privacy-preserving Aggregation Scheme with Adaptive Key Management for Smart Grid”, 2nd IEEE/CIC International Conference on Communications in China (ICCC): QRS: QoS, Reliability and Security,2013.
[3] Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful Jahari Hashim and Borhanuddin M. Ali,” A New Tunnelled EAP based Authentication Method for WiMAX Networks”, IEEE 11th Malaysia International Conference on Communications, November 2013.
[4] Ling-wei Zhou, Sheng-ju Sang,” Analysis and Improvements of PEAP Protocol in WLAN”, International Symposium On Information Technology IN Medicine and Education,2012.
[5] Ahmed M. El- Nagar, Dr. Ahmed A. Abd El-Hafez and Prof.Dr. Adel Elhna Wy,” A Novel EAP-Moderate Weight Extensible Authentication Protocol”,IEEE,2012.
[6] Xiaoling Zheng, Jidong Jin,” Research for the Application and Safety of MD5 Algorithm in Password Authentication”, 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012),2012.
[7] DictionaryAttackonCiscoLEAP,http://www.cisco.com/warp/public/707/cisco-sn-20030802-leap.shtml, 2012.
[8] Khidir M. Ali and Ali Al-Khalifah,” A Comparative Study of Authentication Methods for Wi-Fi Networks”, Third International Conference on Computational Intelligence, Communication Systems and Networks,2011.
[9] Alexandra Chiornita, Laura Gheorghe, Daniel Rosner,” A Practical Analysis of EAP Authentication Methods”, 9th RoEduNet IEEE International Conference ,2010.
[10] D. Simon, B. Aboba, and R. Hurst, "The EAP-TLS Authentication Protocol",RFC 5216, March 2008.
[11] H. Hwang, G. Jung, K. Sohn, and S. Park, “A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using802.1X and EAP,”Proc. Int’l Conf. Information Systems Security, pp. 164-170, 2008.
[12] Flávio O. Silva, João A. A. Pacheco, Pedro F. Rosa, Ph.D.,” A SRP Based Handler for Web Service Access Control” IEEE International Conference on Services Computing (SCC’04),2004.
[13] B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, "Extensible Authentication Protocol (EAP)", RFC 3748, June 2004.
[14] A. Palekar, D. Simon, G. Zorn, J. SaloweY,H. Zhou, and S. Josefsson, "Protected EAP Protocol (PEAP) Version 2", work in progress, October 2004.
[15] Ma. Y. and Cao, X., (2003), “How to use EAP-TLS Authentication in PWLAN Environment”, IEEE, Proceedings of the 2003 International conference on neural networks and signal processing, Volume 2, 14-17 Dec, Pages 1677-1680.
[16] Jitesh Zade,Manish Tembhurkar,”Voice Capacity Over wi-fi network”,IJETED-2014.