EAP-based Authentication with EAP Method Selection Mechanism
Wireless network has grown rapidly in the past few years due to its advantages over the wired network, such as mobility, flexibility, convenience, and rapid deployment. But it also introduces new security issues due to its nature, i.e. it does not need any physical access. One of the solutions t...
| Main Authors: | , , |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/711/ http://scholars.utp.edu.my/id/eprint/711/1/ICIAS_2007_Final_%28PID498323%29.pdf |
| _version_ | 1848659028926791680 |
|---|---|
| author | M.A.C., Bhakti Azween, Abdullah Low, Tan Jung |
| author_facet | M.A.C., Bhakti Azween, Abdullah Low, Tan Jung |
| author_sort | M.A.C., Bhakti |
| building | UTP Institutional Repository |
| collection | Online Access |
| description | Wireless network has grown rapidly in the past few
years due to its advantages over the wired network, such as
mobility, flexibility, convenience, and rapid deployment. But it
also introduces new security issues due to its nature, i.e. it does
not need any physical access. One of the solutions to overcome the
limitation of wireless network security is the IEEE 802.1X
specification, a mechanism for port-based network access control,
which is based on Extensible Authentication Protocol (EAP), an
authentication framework that can support multiple
authentication methods. We propose extension to the EAP
framework for authentication method selection purpose, in order
to reduce the number of fail authentication due to unsuitable EAP
method used for the authentication. The selection will be based on
some criteria such as the node resources, previous authentication
and communication recor |
| first_indexed | 2025-11-13T07:23:55Z |
| format | Conference or Workshop Item |
| id | oai:scholars.utp.edu.my:711 |
| institution | Universiti Teknologi Petronas |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-13T07:23:55Z |
| publishDate | 2007 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | oai:scholars.utp.edu.my:7112017-01-19T08:26:52Z http://scholars.utp.edu.my/id/eprint/711/ EAP-based Authentication with EAP Method Selection Mechanism M.A.C., Bhakti Azween, Abdullah Low, Tan Jung QA75 Electronic computers. Computer science Wireless network has grown rapidly in the past few years due to its advantages over the wired network, such as mobility, flexibility, convenience, and rapid deployment. But it also introduces new security issues due to its nature, i.e. it does not need any physical access. One of the solutions to overcome the limitation of wireless network security is the IEEE 802.1X specification, a mechanism for port-based network access control, which is based on Extensible Authentication Protocol (EAP), an authentication framework that can support multiple authentication methods. We propose extension to the EAP framework for authentication method selection purpose, in order to reduce the number of fail authentication due to unsuitable EAP method used for the authentication. The selection will be based on some criteria such as the node resources, previous authentication and communication recor 2007-11 Conference or Workshop Item PeerReviewed application/pdf en http://scholars.utp.edu.my/id/eprint/711/1/ICIAS_2007_Final_%28PID498323%29.pdf M.A.C., Bhakti and Azween, Abdullah and Low, Tan Jung (2007) EAP-based Authentication with EAP Method Selection Mechanism. In: International Conference on Intelligent and Advanced Systems (ICIAS 2007), November 2007, K.L. |
| spellingShingle | QA75 Electronic computers. Computer science M.A.C., Bhakti Azween, Abdullah Low, Tan Jung EAP-based Authentication with EAP Method Selection Mechanism |
| title | EAP-based Authentication with EAP Method Selection Mechanism |
| title_full | EAP-based Authentication with EAP Method Selection Mechanism |
| title_fullStr | EAP-based Authentication with EAP Method Selection Mechanism |
| title_full_unstemmed | EAP-based Authentication with EAP Method Selection Mechanism |
| title_short | EAP-based Authentication with EAP Method Selection Mechanism |
| title_sort | eap-based authentication with eap method selection mechanism |
| topic | QA75 Electronic computers. Computer science |
| url | http://scholars.utp.edu.my/id/eprint/711/ http://scholars.utp.edu.my/id/eprint/711/1/ICIAS_2007_Final_%28PID498323%29.pdf |