Extensible Authentication Protocol Method for Shared-secret Authentication and Key Establishment (EAP-SAKE)

نویسندگان

  • Michaela C. Vanderveen
  • Hesham Soliman
چکیده

This RFC is not a candidate for any level of Internet Standard. The IETF disclaims any knowledge of the fitness of this RFC for any purpose and in particular notes that the decision to publish is not based on IETF review for such things as security, congestion control, or inappropriate interaction with deployed protocols. The RFC Editor has chosen to publish this document at its discretion. Readers of this document should exercise caution in evaluating its value for implementation and deployment. See RFC 3932 for more information.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Working Group Extensible Authentication Protocol Method for Shared-secret Authentication and Key Establishment (eap-sake)

This RFC is not a candidate for any level of Internet Standard. The IETF disclaims any knowledge of the fitness of this RFC for any purpose and in particular notes that the decision to publish is not based on IETF review for such things as security, congestion control, or inappropriate interaction with deployed protocols. The RFC Editor has chosen to publish this document at its discretion. Rea...

متن کامل

The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method

This document specifies EAP-IKEv2, an Extensible Authentication Protocol (EAP) method that is based on the Internet Key Exchange (IKEv2) protocol. EAP-IKEv2 provides mutual authentication and session key establishment between an EAP peer and an EAP server. It supports authentication techniques that are based on passwords, high-entropy shared keys, and public key certificates. EAP-IKEv2 further ...

متن کامل

Selecting a Standard Outer Method for EAP

This paper outlines the problems in currently available authentication methods, such as EAP-TTLS, EAP-PEAP and EAP-FAST, and describes the desirable properties of a standard outer method. We examine the interaction between inner and outer methods and the types of issues that presently exist. We propose a new authentication method, EAP-PSK [PSK] with tunneling support (EAP-TLS-PSK), as an EAP pr...

متن کامل

Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo defines an Extensible ...

متن کامل

EAP-Sens: a security architecture for wireless sensor networks

We present the design, implementation and simulation of a security protocol based on Extensible Authentication Protocol nick-named EAP-Sens for wireless sensor networks. We use the generalized pre-shared key authentication method for authentication and key establishment. Standard EAP model is used for authenticating sensor nodes within the radio range of the authenticator. For distant nodes, we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • RFC

دوره 4763  شماره 

صفحات  -

تاریخ انتشار 2006