Author : Katrin Hoeper
Publisher : DIANE Publishing
ISBN 13 : 1437926320
Total Pages : 53 pages
Book Rating : 4.4/5 (379 download)
Book Synopsis Recommendation for EAP Methods Used in Wireless Network Access Authentication by : Katrin Hoeper
Download or read book Recommendation for EAP Methods Used in Wireless Network Access Authentication written by Katrin Hoeper and published by DIANE Publishing. This book was released on 2010-11 with total page 53 pages. Available in PDF, EPUB and Kindle. Book excerpt: Specifies security requirements for authentication methods with key establishment supported by the Extensible Authentication Protocol (EAP) for wireless access authentications to federal networks. Contents: 1. Intro.; 2. Scope and Purpose; 3. Definitions, Symbols and Abbreviations; 4. EAP Overview: EAP Communication Links and Involved Parties; EAP Message Flows; EAP Protocol Stacks; Tunnel-based EAP Methods; EAP Key Derivation and Key Hierarchy; EAP Ciphersuite Negotiation; 5. Vulnerabilities of EAP in Wireless Applications; 6. EAP Objectives for Wireless Network Access Authentications; 7. Preconditions for EAP; 8. Security Requirements for Non-tunneled EAP Methods; 9. Requirements for Tunnel-based EAP Methods.