Comparison TTLS and PEAP Comparison by Matthew Gast
نویسنده
چکیده
Broadly speaking, the history of 802.11 security is an attempt to address two major problems. The first problem is that the protocols used to authenticate network users were not strong, so unauthorized users could easily access network resources. Second, the Wired Equivalent Privacy (WEP) system proved insufficient for a number of wellpublicized reasons. Our white paper “What’s Wrong With WEP?” discusses these in detail. In response to user concerns about weak security, the industry began developing a series of stronger protocols for use with wireless LANs. The key standard is IEEE 802.1X, which provides both stronger authentication and a mechanism for deriving and distributing stronger keys to bolster WEP.
منابع مشابه
Man-in-the-Middle in Tunneled Authentication Protocols
Recently new protocols have been proposed in the IETF for protecting remote client authentication protocols by running them within a secure tunnel. Examples of such protocols are PIC, PEAP and EAP-TTLS. One goal of these new protocols is to enable the migration from legacy client authentication protocols to more secure protocols, e.g., from plain EAP type to, say, PEAP. In these protocols, the ...
متن کاملMan-in-the-Middle in Tunnelled Authentication
Recently new protocols have been proposed in IETF for protecting remote client authentication protoocols by running them within a secure tunnel. Examples of such protocols are PIC, PEAP and EAP-TTLS. One goal of these new protocols is to enable the migration from legacy client authentication protocols to more secure protocols, e.g., from plain EAP type to, say, PEAP. In these protocols, the sec...
متن کاملComparative Analysis of IEEE 802.1x Authentication Methods
The IEEE Standard 802.11 is one of the most widely adopted mechanisms for WLANs, it provides comprehensive guidelines for their operational smoothness. 802.11 suffered from limited data confidentiality and cumbersome procedure for exchange of security parameters. In response to the security limitations in 802.11, IEEE introduced 802.1x for authentication and key management. The 802.1x is a port...
متن کاملA Measurement Study on IKEv2 Authentication Performance in Wireless Networks
This paper presents an experimental evaluation of the performance costs of a wide variety of authentication methods over IKEv2 in wireless networks. The studied methods are preshared keys (PSK), extensible authentication protocol (EAP) using MD5, SIM, TTLS-MD5, TLS, and PEAP-MSCHAPv2. For the EAP-based methods RADIUS is used as authentication, authorization, and accounting (AAA) server. Two net...
متن کاملSelecting a Standard Outer Method for EAP
This paper outlines the problems in currently available authentication methods, such as EAP-TTLS, EAP-PEAP and EAP-FAST, and describes the desirable properties of a standard outer method. We examine the interaction between inner and outer methods and the types of issues that presently exist. We propose a new authentication method, EAP-PSK [PSK] with tunneling support (EAP-TLS-PSK), as an EAP pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004