The Extensible Authentication Protocol (EAP) is a framework for transporting authentication credentials. EAP offers simpler interoperability and compatibility across authentication methods. ... methods. In this paper, we have modelled the Extensible Authentication Protocol as a finite state machine. The various entities in our model are Authenticator, EAP Server, User and ...
Tópico(s): Security and Verification in Computing
2012 - | International Journal of Network Security & Its Applications
Alexei Viacheslavovich Nikeshin, Victor Zinovievich Shnitman,
... In this context, of considerable interest is the Extensible Authentication Protocol (EAP), specified by the IETF in RFC 3748, ... specifications IETF. This article is a review of Extensible Authentication Protocol (EAP) and its methods, specified by IETF. EAP ...
Tópico(s): Advanced
2018 - Institute for System Programming of the Russian Academy of Sciences (ISPRAS) | Proceedings of the Institute for System Programming of RAS
This article presents the technical details of the Extensible Authentication Protocol (EAP) and IEEE 802.1x by using WIRE1x, ...
Tópico(s): Bluetooth and Wireless Communication Technologies
2005 - Institute of Electrical and Electronics Engineers | IEEE Communications Magazine
Min‐Gu Lee, Dongwan Kim, Jin-Soo Sohn,
... 능동형 인증 방식을 제공할 수 있는 방법으로 EAP(Extensible Authentication Protocol)과 AAA(Authentication. Authorization and Accounting) 규약을 활용하는 ... mechanism using NFC smart devices based on EAP(Extensible Authentication Protocol) and AAA(Authentication, Authorization and Accounting) protocols.
Tópico(s): Advanced
2012 - THE KOREAN INSTITUTE OF COMMUNICATIONS AND INFORMATION SCIENCES (KICS) | The Journal of Korean Institute of Communications and Information Sciences
Marcin Pawłowski, Antonio J. Jara, Maciej Ogorzałek,
... that combines authentication and bootstrapping protocol (TEPANOM) with Extensible Authentication Protocol (EAP) framework optimized for the IEEE 802.15. ...
Tópico(s): Advanced
2015 - IOS Press | Mobile Information Systems
Alexei Viacheslavovich Nikeshin, Victor Zinovievich Shnitman,
... a model-based approach to conformance testing of Extensible Authentication Protocol (EAP) implementations. Conformance testing is the basic tool ...
Tópico(s): Formal Methods in Verification
2018 - Institute for System Programming of the Russian Academy of Sciences (ISPRAS) | Proceedings of the Institute for System Programming of RAS
Romano Fantacci, Leonardo Maccari, Tommaso Pecorella,
... that are required for authentication protocols, such as Extensible Authentication Protocol Transport Layer Security (EAP-TLS), that require an ...
Tópico(s): Advanced
2007 - Institute of Electrical and Electronics Engineers | IEEE Wireless Communications
Taufik Nur Hidayat, Imam Riadi,
One of the main changes in the field of telecommunications is the use of wireless technology.Wireless technology is also implemented in the Ahmad Dahlan University Campus 3 Research Laboratory environment, better known as wireless LAN (WLAN).Each user within the range of campus research laboratory area Ahmad Dahlan University radiates an access point (AP).Another negative impact is that communication that occurs will be easily intercepted between the security of campus network users.The stages performed ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2021 - | International Journal of Computer Applications
... handled separately using authentication frameworks based on the extensible authentication protocol (EAP). The EAP protocol specified by the IETF ... standard for network access control. It provides an extensible, link layer agnostic protocol for carrying various authentication methods. In this paper, we design the integration ...
Tópico(s): Access Control and Trust
2007 - Institute of Electrical and Electronics Engineers | Proceedings
Rafael Marín-López, Yoshihiro Ohba, Fernando Pereñíguez-García, Antonio Skármeta,
The Extensible Authentication Protocol (EAP) has been standardized within the Internet Engineering Task Force (IETF) in order to provide flexible mechanisms ...
Tópico(s): Mobile Agent-Based Network Management
2009 - Elsevier BV | Computer Standards & Interfaces
Yuh‐Min Tseng, Sen‐Shan Huang, Tung‐Tso Tsai, Li Wei Tseng,
... our protocol as an authentication method of the extensible authentication protocol (EAP) for wireless networks.
Tópico(s): User
2015 - Hindawi Publishing Corporation | International Journal of Distributed Sensor Networks
Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, Madhusanka Liyanage,
... the necessity to provide enhanced security, a lightweight extensible authentication protocol based authentication protocol for WLAN-connected Internet of Things devices is presented. We conduct an informal and formal security analysis ...
Tópico(s): User
2022 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Industrial Informatics
Salekul Islam, J. William Atwood,
... Protocol for Carrying Authentication for Network Access, encapsulating Extensible Authentication Protocol packets, is used to authenticate a sender and ...
Tópico(s): Access Control and Trust
2010 - Elsevier BV | Computer Networks
Fanbao Liu, Tao Xie, Yumeng Feng, Dengguo Feng,
... abolished right now and replaced with more secure Extensible Authentication Protocols. Copyright © 2012 John Wiley & Sons, Ltd.
Tópico(s): Advanced Malware Detection Techniques
2012 - Hindawi Publishing Corporation | Security and Communication Networks
Ram Dantu, Gabriel Clothier, Anuj Atri,
This paper presents an overview and analysis of Extensible Authentication Protocol (EAP) and its place in securing wireless LANs. ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2006 - Elsevier BV | Computer Standards & Interfaces
Dan García-Carrillo, Rafael Marín-López,
... We pay attention to the authentication with the extensible authentication protocol (EAP) and CoAP, which has resulted in a ...
Tópico(s): Security in Wireless Sensor Networks
2018 - Institute of Electrical and Electronics Engineers | IEEE Internet of Things Journal
... a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer ...
Tópico(s): Mobile Ad Hoc Networks
2007 - Inderscience Publishers | International Journal of Information and Computer Security
... In user authentication layer, multiple trusted authorities using Extensible Authentication Protocol (EAP) do the authentication process.In fourth layer ...
Tópico(s): Chaos-based Image/Signal Encryption
2006 - Science Publications | Journal of Computer Science
Chun‐I Fan, Yi-Hui Lin, Ruei‐Hau Hsu,
... access resources in Wireless Local Area Networks (WLANs). Extensible Authentication Protocol (EAP) is an authentication framework widely used in ...
Tópico(s): Bluetooth and Wireless Communication Technologies
2012 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Parallel and Distributed Systems
Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Ayad Ibrahim, Ali Noah Yahya, Iman Qays Abduljaleel, Enas Wahab Abood,
... specified authentication and key agreement (5G-AKA), and extensible authentication protocol–improved AKA (EAP-AKA’) in its Release 16( ...
Tópico(s): Advanced Wireless Communication Technologies
2022 - Springer Nature | Algorithms for intelligent systems
Dan García-Carrillo, Rafael Marín-López,
... federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We ...
Tópico(s): Wireless Body Area Networks
2016 - Multidisciplinary Digital Publishing Institute | Sensors
Pedro Moreno-Sánchez, Rafa López, Antonio Skármeta,
... Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence ...
Tópico(s): Advanced
2013 - Multidisciplinary Digital Publishing Institute | Sensors
Chris Brzuska, Håkon Jacobsen,
... conduct a reduction-based security analysis of the Extensible Authentication Protocol (EAP), a widely used three-party authentication framework. ...
Tópico(s): User
2017 - Springer Science+Business Media | Lecture notes in computer science
Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias,
... of attacks hurled in the IEEE 802.1X Extensible Authentication Protocol (EAP) environment. Second, given that all the 802. ...
Tópico(s): Wireless Networks and
2021 - Institute of Electrical and Electronics Engineers | IEEE Access
Jesús Sánchez-Gómez, Dan García-Carrillo, Rafael Marín-Pérez, Antonio Skármeta,
... and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO- ...
Tópico(s): Wireless Body Area Networks
2020 - Multidisciplinary Digital Publishing Institute | Sensors
Rafael Marín-López, Fernando Pereñíguez-García, Fernando Bernal, Antonio Skármeta,
... where the authentication process is based on the Extensible Authentication Protocol (EAP). The goal is to achieve fast and ...
Tópico(s): Cooperative Communication and Network Coding
2010 - Elsevier BV | Computer Networks
... an authentication framework that is based on the Extensible Authentication Protocol (EAP). When a roaming user wants to access ...
Tópico(s): Mobile Ad Hoc Networks
2006 - Institution of Engineering and Technology | IEE Proceedings - Communications
Anastasios N. Bikos, Nicolas Sklavos,
... authentication and ciphering algorithms, such as EAP-AKA (Extensible Authentication Protocol for Authentication and Key Agreement), currently operating within ...
Tópico(s): RFID technology advancements
2013 - Institute of Electrical and Electronics Engineers | IEEE Security & Privacy
Zoltán Faigl, Stefan Lindskog, Anna Brunström,
... The studied methods are pre‐shared keys (PSKs), extensible authentication protocol (EAP) using MD5, SIM, TTLS‐MD5, TLS, and ...
Tópico(s): RFID technology advancements
2009 - Hindawi Publishing Corporation | Security and Communication Networks
... strong authentication in IP networks, according to the extensible authentication protocol (EAP). An open software implementation has been released ...
Tópico(s): Mobile Ad Hoc Networks
2008 - Wiley | International Journal of Network Management