2,617 research outputs found
Authentication Mechanism for Ad Hoc Wireless Local Area Network
Wireless networks have grown rapidly over the last decade and they have been
deployed in numerous applications due to their advantages over wired networks,
specifically for its mobility and convenience. However, due to its wireless nature,
some security issues in wireless network need to be addressed, such as unauthorized
or rogue wireless devices which are relatively easy to connect to the network because
they do not need any physical access. These issues might prevent further acceptance
and adoption of wireless network technology.
One of the solutions to overcome the wireless network security is the 802.1X
specification. It is a mechanism for port-based network access control, which based
on Extensible Authentication Protocol (EAP). It is an authentication framework that
can support multiple authentication methods. This research is looking into the
possibility of using EAP as a generic authentication mechanism in ad hoc wireless
local area networks. One promising advantage of using EAP-based authentication
mechanism in a network is its interoperability with other types of networks since EAP
is already a platform for various authentication mechanisms.
This thesis studies and explores the feasibility of using EAP in ad hoc wireless
local area network and then proposes a mechanism to implement EAP in ad hoc
wireless local area network based on EAP multiplexing model. This thesis also
proposes an extension to EAP, a mechanism to select a suitable EAP method out of a
set of EAP methods to be used in EAP authentication process in heterogeneous
mobile devices environment, where the network consists of different types of nodes I
devices with different specifications and capabilities, and each node may support
different type of EAP authentication method.
Toward the end of this thesis, formal specification and verification of the
proposed authentication mechanism are derived and strong final beliefs are obtained.
Furthermore, node architecture that can be used in simulation of EAP authentication
is designed and the EAP method selection mechanism is simulated
Classification of EAP methods and Some Major Attacks on EAP
This paper presents an overview of authentication protocol and analysis of Extensible Authentication Protocol (EAP) and its place in securing network. In general, authentication procedure adds extra messages to the original message flow and results in throughput reduction/ increase in processing time. Extensible Authentication Protocol (EAP) is a framework which aims to provide a flexible authentication for wireless networks. A number of specific widely used EAP methods are examined and evaluated for their advantages and susceptibility to types of attack. In addition, we evaluate how we communicate between two entities over the network
802.1X Based Wireless Network Security Audit
Tento semestrĂĄlnĂ projekt se zabĂ˝vĂĄ analĂ˝zou zabezpeÄenĂ bezdrĂĄtovĂ˝ch WiFi sĂtĂ zaloĹženĂ˝ch na standardu 802.1X a metodou auditu tÄchto sĂtĂ. V prĂĄci jsou popsĂĄny jednotlivĂŠ verze metod autentizaÄnĂho protokolu EAP pouĹžĂvanĂŠ v bezdrĂĄtovĂ˝ch sĂtĂch, rizika vyplĂ˝vajĂcĂ z jejich nasazenĂ a doporuÄenĂ pro zmĂrnÄnĂ tÄchto rizik. SouÄĂĄstĂ prĂĄce je takĂŠ nĂĄvrh a implementace aplikace urÄenĂŠ pro audit 802.1X bezdrĂĄtovĂ˝ch sĂtĂ se zamÄĹenĂm na zpracovĂĄnĂ protokolu EAP.This term project analyzes the security of 802.1X based wireless networks and presents the methodology for auditing these networks. The thesis describes various methods of the EAP authentication protocol used in wireless networks, security risks arising from their usage and recommendations for mitigating these risks. The paper also includes implementation of applications for 802.1X based wireless network audit focusing on the EAP protocol processing.
Recommended from our members
Selection of EAP-authentication methods in WLANs
IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer
authentication methods each with different benefits and drawbacks. Any one of these authentication methods can be the ideal choice for a specific networking environment. The fact that IEEE 802.11i leaves the selection of the most suitable authentication method to system implementers makes the authentication framework more flexible, but on the other hand leads to the
question of how to select the authentication method that suits an organisationâs requirements and specific networking environment. This paper gives an overview of EAP authentication methods and provides a table comparing their properties. It then identifies the crucial factors to be considered when employing EAP authentication methods in WLAN environments. The paper presents algorithms that guide the selection of an EAP-authentication method for a WLAN and demonstrates their application through three examples
IPv6 Network Mobility
Network Authentication, Authorization, and Accounting has
been used since before the days of the Internet as we know it
today. Authentication asks the question, âWho or what are
you?â Authorization asks, âWhat are you allowed to do?â And fi nally,
accounting wants to know, âWhat did you do?â These fundamental
security building blocks are being used in expanded ways today. The
fi rst part of this two-part series focused on the overall concepts of
AAA, the elements involved in AAA communications, and highlevel
approaches to achieving specifi c AAA goals. It was published in
IPJ Volume 10, No. 1[0]. This second part of the series discusses the
protocols involved, specifi c applications of AAA, and considerations
for the future of AAA
Particularities of security design for wireless networks in small and medium business (SMB)
Small businesses often have small budgets, which often means no fulltime IT staff or no possibility to hire a security consultant to set up a wireless LAN properly. This paper tries to develop a methodology for designing security for wireless networks in SMB. There are more security options to choose from, when setting up a wireless network, thus the security features needed for a company must be carefully taken in consideration. The benefits from one security feature must be balanced with the implementation and maintenance cost and with the risk of not getting the security level wanted.security, wireless, communication networks
- âŚ