The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP also defines an extensible Link Control Protocol (LCP), which can be used to negotiate authentication methods, as well as an Encryption Control Protocol (ECP), used to negotiate data encryption over PPP links, and a Compression Control Protocol (CCP), used to negotiate compression methods. The Extensible Authentication Protocol (EAP) is a PPP extension that provides support for additional authentication methods within PPP.
RFC Downloads
Cited By
- Rodoper M, Baliga A, Jung E and Trappe W An efficient security framework for mobile WiMAX Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1494-1501)
- Trimintzios P and Georgiou G (2010). WiFi and WiMAX secure deployments, Journal of Computer Systems, Networks, and Communications, 2010:S1, (1-28), Online publication date: 1-Jan-2010.
- Tseng Y (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks, Computer Standards & Interfaces, 31:1, (128-136), Online publication date: 1-Jan-2009.
- Harding A, van der Horst T and Seamons K Wireless authentication using remote passwords Proceedings of the first ACM conference on Wireless network security, (24-29)
- Martignon F, Paris S and Capone A MobiSEC Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks, (35-42)
- Liu D and Coslow M Extensible authentication protocols for IEEE standards 802.11 and 802.16 Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-9)
- Torres J, Izquierdo A, Carbonell M and Sierra J Network smart card performing U(SIM) functionalities in AAA protocol architectures Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks, (92-105)
- López G, Cánovas O, Gómez A, Jiménez J and Marín R (2007). A network access control approach based on the AAA architecture and authorization attributes, Journal of Network and Computer Applications, 30:3, (900-919), Online publication date: 1-Aug-2007.
- Ohba Y, Das S and Dutta A Kerberized handover keying Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture, (1-7)
- Badra M and Urien P Adding Identity Protection to EAP-TLS Smartcards Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2951-2956)
- Akhlaq M, Aslam B, Khan M and Jafri M Comparative analysis of IEEE 802.1x authentication methods Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11, (1-6)
- Cha E and Choi H A study of performance improvement in EAP Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (1183-1186)
- Hur J, Park C and Yoon H An efficient pre-authentication scheme for IEEE 802.11-based vehicular networks Proceedings of the Security 2nd international conference on Advances in information and computer security, (121-136)
- Marin R, Fernandez P and Gomez A 3-party approach for fast handover in EAP-based wireless networks Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, (1734-1751)
- Lopez R, Skarmeta A, Bournelle J, Laurent-Maknavicus M and Combes J Improved EAP keying framework for a secure mobility access service Proceedings of the 2006 international conference on Wireless communications and mobile computing, (183-188)
- Moustafa H, Bourdon G and Gourhant Y Authentication, authorization and accounting (AAA) in hybrid ad hoc hotspot's environments Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots, (37-46)
- Chi K, Jiang J and Yen L (2006). Cost-Effective Caching for Mobility Support in IEEE 802.1X Frameworks, IEEE Transactions on Mobile Computing, 5:11, (1547-1560), Online publication date: 1-Nov-2006.
- Wienzek R and Persaud R Fast re-authentication for handovers in wireless communication networks Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, (556-567)
- Vaidya B, Kim Y, Kim E and Han S Investigating authentication mechanisms for wireless mobile network Proceedings of the Third international conference on Ubiquitous Intelligence and Computing, (902-911)
- Park J, Kim B and Hwang I Secure and seamless handoff scheme for a wireless LAN system Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (595-604)
- Kim B and Hong S (2018). Secure Mutual Authentication for Ad hoc Wireless Networks, The Journal of Supercomputing, 33:1, (123-132), Online publication date: 1-Jul-2005.
- Meyer U, Cordasco J and Wetzel S An approach to enhance inter-provider roaming through secret sharing and its application to WLANs Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (1-13)
- Moustafa H, Bourdon G and Gourhant Y AAA in vehicular communication on highways with ad hoc networking support Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks, (79-80)
- Barbeau M WiMax/802.16 threat analysis Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, (8-15)
- Lopez G, Gomez A, Marin R and Canovas O A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
- Zhang H, Duan H, Liu W and Wu J An extensible AAA infrastructure for IPv6 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II, (482-487)
- Zhang F, Ma J and Moon S The security proof of a 4-way handshake protocol in IEEE 802.11i Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II, (488-493)
- Hong K, Jung S and Wu S A hash-chain based authentication scheme for fast handover in wireless network Proceedings of the 6th international conference on Information Security Applications, (96-107)
- Balfanz D, Durfee G, Grinter R and Smetters D (2004). In Search of Usable Security, IEEE Security and Privacy, 2:5, (19-24), Online publication date: 1-Sep-2004.
- He C and Mitchell J Analysis of the 802.11i 4-way handshake Proceedings of the 3rd ACM workshop on Wireless security, (43-50)
- Adya A, Bahl P, Chandra R and Qiu L Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks Proceedings of the 10th annual international conference on Mobile computing and networking, (30-44)
- Shin M, Mishra A and Arbaugh W Improving the latency of 802.11 hand-offs using neighbor graphs Proceedings of the 2nd international conference on Mobile systems, applications, and services, (70-83)
- Balfanz D, Durfee G, Grinter R, Smetters D and Stewart P Network-in-a-box Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, (15-15)
- Lee J and Ryou J Strong user authentication in IEEE802.11 wireless LAN Proceedings of the 2nd international conference on Human.society@internet, (638-643)
- Nikander P Authorization and Charging in Public WLANs Using FreeBSD and 802.1x Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, (109-119)
Recommendations
USIM-based EAP-TLS authentication protocol for wireless local area networks
Due to the rapid growth in popularity of Wireless Local Area Network (WLAN), wireless security has become one of many important research issues. For the WLAN security, the IEEE 802.1X standard provides an authentication framework that is based on the ...