Liu et al., 2008 - Google Patents
Extensible authentication protocols for IEEE standards 802.11 and 802.16Liu et al., 2008
- Document ID
- 7015933703533568382
- Author
- Liu D
- Coslow M
- Publication year
- Publication venue
- Proceedings of the international conference on mobile technology, applications, and systems
External Links
Snippet
In this paper, the challenges involved in authentication over wireless networks including wireless LANs, IEEE 802.11, and WIMAX, IEEE 802.16 are described. Both IEEE 802.11 i and 802.16 e support EAP (Extensible Authentication Protocol) for authentication, but do not …
- 238000004891 communication 0 abstract description 30
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0892—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/02—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization
- H04L41/0213—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization using standardized network management protocols, e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
- H04L41/0803—Configuration setting of network or network elements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhargavan et al. | Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS | |
US8281127B2 (en) | Method for digital identity authentication | |
Simon et al. | The EAP-TLS authentication protocol | |
CN1875567B (en) | Protected Dynamic Provisioning of Credentials | |
US8352739B2 (en) | Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same | |
Cam-Winget et al. | The flexible authentication via secure tunneling extensible authentication protocol method (EAP-FAST) | |
Wong | The evolution of wireless security in 802.11 networks: WEP, WPA and 802.11 standards | |
US20120072717A1 (en) | Dynamic identity authentication system | |
CN110020524A (en) | A kind of mutual authentication method based on smart card | |
Baek et al. | A Survey of WPA and 802.11 i RSN Authentication Protocols | |
Keerthi | Taxonomy of SSL/TLS attacks | |
Hoeper et al. | Where EAP security claims fail | |
Liu et al. | Extensible authentication protocols for IEEE standards 802.11 and 802.16 | |
Shojaie et al. | Enhancing EAP-TLS authentication protocol for IEEE 802.11 i | |
Yang et al. | Link-layer protection in 802.11 i WLANS with dummy authentication | |
Simon et al. | RFC 5216: The EAP-TLS Authentication Protocol | |
Turab et al. | A comparison between wireless LAN security protocols | |
Sithirasenan et al. | EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability | |
Clancy et al. | Extensible authentication protocol (EAP) password authenticated exchange | |
Rai et al. | Strong password based EAP-TLS authentication protocol for WiMAX | |
KR102345093B1 (en) | Security session establishment system and security session establishment method for wireless internet | |
Jain et al. | SAP: a low-latency protocol for mitigating evil twin attacks and high computation overhead in WI-FI networks | |
Robyns | Wireless network privacy | |
KR20100034461A (en) | A method for authentication in a communication network and a system thereof | |
Veugen et al. | General security analysis of an IT configuration based on WLAN |