Comparison TTLS and PEAP Comparison by Matthew Gast

نویسنده

  • Matthew Gast
چکیده

Broadly speaking, the history of 802.11 security is an attempt to address two major problems. The first problem is that the protocols used to authenticate network users were not strong, so unauthorized users could easily access network resources. Second, the Wired Equivalent Privacy (WEP) system proved insufficient for a number of wellpublicized reasons. Our white paper “What’s Wrong With WEP?” discusses these in detail. In response to user concerns about weak security, the industry began developing a series of stronger protocols for use with wireless LANs. The key standard is IEEE 802.1X, which provides both stronger authentication and a mechanism for deriving and distributing stronger keys to bolster WEP.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Man-in-the-Middle in Tunneled Authentication Protocols

Recently new protocols have been proposed in the IETF for protecting remote client authentication protocols by running them within a secure tunnel. Examples of such protocols are PIC, PEAP and EAP-TTLS. One goal of these new protocols is to enable the migration from legacy client authentication protocols to more secure protocols, e.g., from plain EAP type to, say, PEAP. In these protocols, the ...

متن کامل

Man-in-the-Middle in Tunnelled Authentication

Recently new protocols have been proposed in IETF for protecting remote client authentication protoocols by running them within a secure tunnel. Examples of such protocols are PIC, PEAP and EAP-TTLS. One goal of these new protocols is to enable the migration from legacy client authentication protocols to more secure protocols, e.g., from plain EAP type to, say, PEAP. In these protocols, the sec...

متن کامل

Comparative Analysis of IEEE 802.1x Authentication Methods

The IEEE Standard 802.11 is one of the most widely adopted mechanisms for WLANs, it provides comprehensive guidelines for their operational smoothness. 802.11 suffered from limited data confidentiality and cumbersome procedure for exchange of security parameters. In response to the security limitations in 802.11, IEEE introduced 802.1x for authentication and key management. The 802.1x is a port...

متن کامل

A Measurement Study on IKEv2 Authentication Performance in Wireless Networks

This paper presents an experimental evaluation of the performance costs of a wide variety of authentication methods over IKEv2 in wireless networks. The studied methods are preshared keys (PSK), extensible authentication protocol (EAP) using MD5, SIM, TTLS-MD5, TLS, and PEAP-MSCHAPv2. For the EAP-based methods RADIUS is used as authentication, authorization, and accounting (AAA) server. Two net...

متن کامل

Selecting a Standard Outer Method for EAP

This paper outlines the problems in currently available authentication methods, such as EAP-TTLS, EAP-PEAP and EAP-FAST, and describes the desirable properties of a standard outer method. We examine the interaction between inner and outer methods and the types of issues that presently exist. We propose a new authentication method, EAP-PSK [PSK] with tunneling support (EAP-TLS-PSK), as an EAP pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004