Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
RFC2716: PPP EAP TLS Authentication Protocol1999 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 October 1999
Reflects downloads up to 15 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP also defines an extensible Link Control Protocol (LCP), which can be used to negotiate authentication methods, as well as an Encryption Control Protocol (ECP), used to negotiate data encryption over PPP links, and a Compression Control Protocol (CCP), used to negotiate compression methods. The Extensible Authentication Protocol (EAP) is a PPP extension that provides support for additional authentication methods within PPP.

RFC Downloads

Cited By

  1. ACM
    Rodoper M, Baliga A, Jung E and Trappe W An efficient security framework for mobile WiMAX Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1494-1501)
  2. Trimintzios P and Georgiou G (2010). WiFi and WiMAX secure deployments, Journal of Computer Systems, Networks, and Communications, 2010:S1, (1-28), Online publication date: 1-Jan-2010.
  3. Tseng Y (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks, Computer Standards & Interfaces, 31:1, (128-136), Online publication date: 1-Jan-2009.
  4. ACM
    Harding A, van der Horst T and Seamons K Wireless authentication using remote passwords Proceedings of the first ACM conference on Wireless network security, (24-29)
  5. ACM
    Martignon F, Paris S and Capone A MobiSEC Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks, (35-42)
  6. ACM
    Liu D and Coslow M Extensible authentication protocols for IEEE standards 802.11 and 802.16 Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-9)
  7. Torres J, Izquierdo A, Carbonell M and Sierra J Network smart card performing U(SIM) functionalities in AAA protocol architectures Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks, (92-105)
  8. López G, Cánovas O, Gómez A, Jiménez J and Marín R (2007). A network access control approach based on the AAA architecture and authorization attributes, Journal of Network and Computer Applications, 30:3, (900-919), Online publication date: 1-Aug-2007.
  9. ACM
    Ohba Y, Das S and Dutta A Kerberized handover keying Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture, (1-7)
  10. Badra M and Urien P Adding Identity Protection to EAP-TLS Smartcards Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2951-2956)
  11. Akhlaq M, Aslam B, Khan M and Jafri M Comparative analysis of IEEE 802.1x authentication methods Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11, (1-6)
  12. Cha E and Choi H A study of performance improvement in EAP Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (1183-1186)
  13. Hur J, Park C and Yoon H An efficient pre-authentication scheme for IEEE 802.11-based vehicular networks Proceedings of the Security 2nd international conference on Advances in information and computer security, (121-136)
  14. Marin R, Fernandez P and Gomez A 3-party approach for fast handover in EAP-based wireless networks Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, (1734-1751)
  15. ACM
    Lopez R, Skarmeta A, Bournelle J, Laurent-Maknavicus M and Combes J Improved EAP keying framework for a secure mobility access service Proceedings of the 2006 international conference on Wireless communications and mobile computing, (183-188)
  16. ACM
    Moustafa H, Bourdon G and Gourhant Y Authentication, authorization and accounting (AAA) in hybrid ad hoc hotspot's environments Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots, (37-46)
  17. Chi K, Jiang J and Yen L (2006). Cost-Effective Caching for Mobility Support in IEEE 802.1X Frameworks, IEEE Transactions on Mobile Computing, 5:11, (1547-1560), Online publication date: 1-Nov-2006.
  18. Wienzek R and Persaud R Fast re-authentication for handovers in wireless communication networks Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, (556-567)
  19. Vaidya B, Kim Y, Kim E and Han S Investigating authentication mechanisms for wireless mobile network Proceedings of the Third international conference on Ubiquitous Intelligence and Computing, (902-911)
  20. Park J, Kim B and Hwang I Secure and seamless handoff scheme for a wireless LAN system Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (595-604)
  21. Kim B and Hong S (2018). Secure Mutual Authentication for Ad hoc Wireless Networks, The Journal of Supercomputing, 33:1, (123-132), Online publication date: 1-Jul-2005.
  22. ACM
    Meyer U, Cordasco J and Wetzel S An approach to enhance inter-provider roaming through secret sharing and its application to WLANs Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (1-13)
  23. ACM
    Moustafa H, Bourdon G and Gourhant Y AAA in vehicular communication on highways with ad hoc networking support Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks, (79-80)
  24. ACM
    Barbeau M WiMax/802.16 threat analysis Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, (8-15)
  25. Lopez G, Gomez A, Marin R and Canovas O A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
  26. Zhang H, Duan H, Liu W and Wu J An extensible AAA infrastructure for IPv6 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II, (482-487)
  27. Zhang F, Ma J and Moon S The security proof of a 4-way handshake protocol in IEEE 802.11i Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II, (488-493)
  28. Hong K, Jung S and Wu S A hash-chain based authentication scheme for fast handover in wireless network Proceedings of the 6th international conference on Information Security Applications, (96-107)
  29. Balfanz D, Durfee G, Grinter R and Smetters D (2004). In Search of Usable Security, IEEE Security and Privacy, 2:5, (19-24), Online publication date: 1-Sep-2004.
  30. ACM
    He C and Mitchell J Analysis of the 802.11i 4-way handshake Proceedings of the 3rd ACM workshop on Wireless security, (43-50)
  31. ACM
    Adya A, Bahl P, Chandra R and Qiu L Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks Proceedings of the 10th annual international conference on Mobile computing and networking, (30-44)
  32. ACM
    Shin M, Mishra A and Arbaugh W Improving the latency of 802.11 hand-offs using neighbor graphs Proceedings of the 2nd international conference on Mobile systems, applications, and services, (70-83)
  33. Balfanz D, Durfee G, Grinter R, Smetters D and Stewart P Network-in-a-box Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, (15-15)
  34. Lee J and Ryou J Strong user authentication in IEEE802.11 wireless LAN Proceedings of the 2nd international conference on Human.society@internet, (638-643)
  35. Nikander P Authorization and Charging in Public WLANs Using FreeBSD and 802.1x Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, (109-119)
Contributors

Recommendations