Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/1515
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ali, KM | - |
dc.contributor.author | Owens, TJ | - |
dc.coverage.spatial | 24 | en |
dc.date.accessioned | 2008-01-04T16:29:22Z | - |
dc.date.available | 2008-01-04T16:29:22Z | - |
dc.date.issued | 2007 | - |
dc.identifier.citation | Int. J. Information and Computer Security, Vol. 1, No. 1/2. | en |
dc.identifier.issn | 1744-1773 | - |
dc.identifier.uri | www.inderscience.com/filter.php?aid=12251 | en |
dc.identifier.uri | http://bura.brunel.ac.uk/handle/2438/1515 | - |
dc.description.abstract | IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks. Any one of these authentication methods can be the ideal choice for a specific networking environment. The fact that IEEE 802.11i leaves the selection of the most suitable authentication method to system implementers makes the authentication framework more flexible, but on the other hand leads to the question of how to select the authentication method that suits an organisation’s requirements and specific networking environment. This paper gives an overview of EAP authentication methods and provides a table comparing their properties. It then identifies the crucial factors to be considered when employing EAP authentication methods in WLAN environments. The paper presents algorithms that guide the selection of an EAP-authentication method for a WLAN and demonstrates their application through three examples. | en |
dc.format.extent | 203776 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en | - |
dc.publisher | Inderscience | en |
dc.relation.ispartof | 1/2; | - |
dc.subject | Extensible authentication protocol | en |
dc.subject | IEEE 802.1X | en |
dc.title | Selection of EAP-authentication methods in WLANs | en |
dc.type | Research Paper | en |
Appears in Collections: | Electronic and Electrical Engineering Dept of Electronic and Electrical Engineering Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
IJICS-1004.pdf | 133.33 kB | Adobe PDF | View/Open |
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.