EAP authentication mechanism for Ad Hoc wireless LAN

Wireless networks have some security issues, mainly due to its wireless nature (open and non-physical), that need to be addressed. One of the solutions to improve wireless network security is the IEEE 802.1X specification, which is based on Extensible Authentication Protocol (EAP). EAP is an authent...

Full description

Saved in:
Bibliographic Details
Main Authors: M. Agni Catur Bhakti, Azween Abdullah, Low, Tan Jung, Halabi Hasbullah
Format: Article
Language:English
Published: Penerbit UKM 2008
Online Access:http://journalarticle.ukm.my/5047/1/01.pdf
http://journalarticle.ukm.my/5047/
http://www.ukm.my/jitm/vol5_2008_13-40.html
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Kebangsaan Malaysia
Language: English
id my-ukm.journal.5047
record_format eprints
spelling my-ukm.journal.50472016-12-14T06:37:38Z http://journalarticle.ukm.my/5047/ EAP authentication mechanism for Ad Hoc wireless LAN M. Agni Catur Bhakti, Azween Abdullah, Low, Tan Jung Halabi Hasbullah, Wireless networks have some security issues, mainly due to its wireless nature (open and non-physical), that need to be addressed. One of the solutions to improve wireless network security is the IEEE 802.1X specification, which is based on Extensible Authentication Protocol (EAP). EAP is an authentication framework that can support multiple authentication methods. With its advantage of being flexible, EAP has been used in many types of networks, wired and wireless, including the infrastructure model of wireless LAN. With EAP’s flexibility, it might be also possible to use EAP as a generic authentication mechanism in other types of networks. This paper studies and explores the feasibility of using EAP in ad-hoc model of WLAN and proposes a mechanism to implement EAP in ad hoc WLAN based on EAP multiplexing model. We also propose a mechanism to select a suitable EAP method out of a set of EAP methods to be used in authentication process in heterogeneous wireless network, in which there are different types of nodes with different specifications and capabilities in the network. Thus, each node may support a different type of EAP authentication method. Toward the end of this paper, we formally specify and verify the proposed authentication mechanism in order to proof and obtain strong beliefs of the authentication. Penerbit UKM 2008 Article PeerReviewed application/pdf en http://journalarticle.ukm.my/5047/1/01.pdf M. Agni Catur Bhakti, and Azween Abdullah, and Low, Tan Jung and Halabi Hasbullah, (2008) EAP authentication mechanism for Ad Hoc wireless LAN. Jurnal Teknologi Maklumat dan Multimedia, 5 . pp. 13-40. ISSN 1823-0113 http://www.ukm.my/jitm/vol5_2008_13-40.html
institution Universiti Kebangsaan Malaysia
building Perpustakaan Tun Sri Lanang Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Kebangsaan Malaysia
content_source UKM Journal Article Repository
url_provider http://journalarticle.ukm.my/
language English
description Wireless networks have some security issues, mainly due to its wireless nature (open and non-physical), that need to be addressed. One of the solutions to improve wireless network security is the IEEE 802.1X specification, which is based on Extensible Authentication Protocol (EAP). EAP is an authentication framework that can support multiple authentication methods. With its advantage of being flexible, EAP has been used in many types of networks, wired and wireless, including the infrastructure model of wireless LAN. With EAP’s flexibility, it might be also possible to use EAP as a generic authentication mechanism in other types of networks. This paper studies and explores the feasibility of using EAP in ad-hoc model of WLAN and proposes a mechanism to implement EAP in ad hoc WLAN based on EAP multiplexing model. We also propose a mechanism to select a suitable EAP method out of a set of EAP methods to be used in authentication process in heterogeneous wireless network, in which there are different types of nodes with different specifications and capabilities in the network. Thus, each node may support a different type of EAP authentication method. Toward the end of this paper, we formally specify and verify the proposed authentication mechanism in order to proof and obtain strong beliefs of the authentication.
format Article
author M. Agni Catur Bhakti,
Azween Abdullah,
Low, Tan Jung
Halabi Hasbullah,
spellingShingle M. Agni Catur Bhakti,
Azween Abdullah,
Low, Tan Jung
Halabi Hasbullah,
EAP authentication mechanism for Ad Hoc wireless LAN
author_facet M. Agni Catur Bhakti,
Azween Abdullah,
Low, Tan Jung
Halabi Hasbullah,
author_sort M. Agni Catur Bhakti,
title EAP authentication mechanism for Ad Hoc wireless LAN
title_short EAP authentication mechanism for Ad Hoc wireless LAN
title_full EAP authentication mechanism for Ad Hoc wireless LAN
title_fullStr EAP authentication mechanism for Ad Hoc wireless LAN
title_full_unstemmed EAP authentication mechanism for Ad Hoc wireless LAN
title_sort eap authentication mechanism for ad hoc wireless lan
publisher Penerbit UKM
publishDate 2008
url http://journalarticle.ukm.my/5047/1/01.pdf
http://journalarticle.ukm.my/5047/
http://www.ukm.my/jitm/vol5_2008_13-40.html
_version_ 1643736292517740544