Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Literature Review on EAP Methods


Affiliations
1 Bharati Vidyapeeth College of Engineering, Kolhapur, India
     

   Subscribe/Renew Journal


Extensible Authentication Protocol (EAP), defined in RFC 3748 [1], is a flexible authentication framework that has been frequently utilized in WLANs. For IEEE 802.11, WPA and WPA2 have utilized EAP as their authentication mechanisms, such as EAP-TLS, EAP-TTLS, and EAP-SIM. A network administrator can appropriately choose a desired authentication mechanism, called an EAP method. In this paper we have discussed different EAP methods & its implementation, application. There are different requirements of EAP methods defined in RFC 3748 which are partially or fully satisfied by these methods. These methods are widely used in authentication for wireless network. There are several vendor specific methods which are simpler and satisfy the requirements in RFC 3748.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 163

PDF Views: 3




  • Literature Review on EAP Methods

Abstract Views: 163  |  PDF Views: 3

Authors

Anupama Patil
Bharati Vidyapeeth College of Engineering, Kolhapur, India
Sameer Nagtilak
Bharati Vidyapeeth College of Engineering, Kolhapur, India
Shweta Mane
Bharati Vidyapeeth College of Engineering, Kolhapur, India

Abstract


Extensible Authentication Protocol (EAP), defined in RFC 3748 [1], is a flexible authentication framework that has been frequently utilized in WLANs. For IEEE 802.11, WPA and WPA2 have utilized EAP as their authentication mechanisms, such as EAP-TLS, EAP-TTLS, and EAP-SIM. A network administrator can appropriately choose a desired authentication mechanism, called an EAP method. In this paper we have discussed different EAP methods & its implementation, application. There are different requirements of EAP methods defined in RFC 3748 which are partially or fully satisfied by these methods. These methods are widely used in authentication for wireless network. There are several vendor specific methods which are simpler and satisfy the requirements in RFC 3748.