skip to main content
10.1145/1506270.1506330acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobilityConference Proceedingsconference-collections
research-article

Extensible authentication protocols for IEEE standards 802.11 and 802.16

Authors Info & Claims
Published:10 September 2008Publication History

ABSTRACT

In this paper, the challenges involved in authentication over wireless networks including wireless LANs, IEEE 802.11, and WIMAX, IEEE 802.16 are described. Both IEEE 802.11i and 802.16e support EAP (Extensible Authentication Protocol) for authentication, but do not specify the EAP method required for authentication. This paper examines four different categories of EAP methods: legacy methods such as EAP-MD5 and CHAP, certificate-based authentication methods such as EAP-TLS, EAP-TTLS, and PEAP; password-based authentication methods, such as EAP-LEAP and EAP-FAST; and strong password-based authentication methods such as EAP-SPEKE. The EAP methods are examined with respect to their vulnerabilities as well as their convenience of utilization. The legacy methods do not meet the criteria established by RFC 4017 to be used for wireless communication. The conclusion is that although certificate-based authentication methods such as EAP-TLS which is specifically mentioned in 802.16e have the strongest security, these methods are not very convenient to use. Password-based authentication methods, on the other hand, are very convenient to use, but provide the least amount of security. The strong password-based authentication methods may be a good alternative to certificate-based authentication, providing a strong level of security while being convenient to use as well as providing authentication of the user as well as the device.

References

  1. Adoba, B., Blunk, L., Vollbrecht, J., Carlson, J. and Levkowetz, E. 2004. Extensible authentication protocol (EAP). RFC 3748.Google ScholarGoogle Scholar
  2. Simpson, W. 1996. PPP challenge handshake authentication protocol (CHAP). RFC 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Zorn, G. and Cobb, S. 1998. Microsoft PPP CHAP extensions. RFC 2433. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Zorn, G. 2000. Microsoft PPP CHAP extensions, version 2. RFC 2759. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Gutmann, P. Everything you never wanted to know about pki but were force to find out. U. of AucklandGoogle ScholarGoogle Scholar
  6. Simon, D., Aboba, B., and Hurst, R. 2008. The EAP-TLS authentication protocol. RFC 2716. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Funk, P. and Blake-Wilson, S. 2008. EAP tunneled TLS authentication protocol version 0 (EAP-TLSv0). Internet-Draft.Google ScholarGoogle Scholar
  8. Kamath, V., Palekar, A, and Wodrich, M. 2002. Microsoft's PEAP version 0 (implementation in windows XP SP1). Internet-Draft.Google ScholarGoogle Scholar
  9. IETF. 2007. EAP methods for 802.11 wireless LAN security.Google ScholarGoogle Scholar
  10. Jones, D. 2003. Look before you LEAP. Unstrung.com October, 2003.Google ScholarGoogle Scholar
  11. Cam-Winget, N., Mcgrew, D., Salowey, J., Zhou, H. 2007. The flexible authentication via secure tunneling extensible authentication protocol method (EAP-FAST). RFC 4851.Google ScholarGoogle Scholar
  12. Stanley, D., Walker, J., and Aboba, B. 2005. Extensible authentication protocol (EAP) method requirements for wireless LANs. RFC 4017Google ScholarGoogle Scholar

Index Terms

  1. Extensible authentication protocols for IEEE standards 802.11 and 802.16

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          Mobility '08: Proceedings of the International Conference on Mobile Technology, Applications, and Systems
          September 2008
          689 pages
          ISBN:9781605580890
          DOI:10.1145/1506270

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 September 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader