One small step for a man
One Giant leap for the mankind

There is no wealth like Knowledge
                            No Poverty like Ignorance
Journal of Emerging Trends in Computing and Information Sciences Logo

Journal of Emerging Trends in Computing and Information Sciences >> Call for Papers Vol. 8 No. 3, March 2017

Journal of Emerging Trends in Computing and Information Sciences

Algorithm for Selection of EAP Authentication Method for Use In A Public WLAN

Full Text Pdf Pdf
Author David Gitonga Mwathi, William Okello-Odongo, Elisha Opiyo
ISSN 2079-8407
On Pages 311-316
Volume No. 7
Issue No. 6
Issue Date July 1, 2016
Publishing Date July 1, 2016
Keywords Extensible authentication protocol, wireless LAN, attacks.


Abstract

Several recent studies indicate that many implementations of authentication and access control in public WLANs are compromisable. This is because IEEE 802.11 standard leaves the choice of EAP method to use to the discretion of WLAN system implementers due to the fact that IEEE 802.11 standard cannot and does not define the upper layer authentication. Therefore, this paper presents IEEE 802.11 implementation specific issues that may contribute to poor security performance of WLAN authentication and access control implementation. It also analyses various EAP methods and presents an algorithm for selection of an Extensible authentication protocol (EAP) method for a Public WLAN.
Back

Seperator
    Journal of Computing | Call for Papers (CFP) | Journal Blog | Journal of Systems and Software | ARPN Journal of Science and Technology | International Journal of Health and Medical Sciences | International Journal of Economics, Finance and Management     
Copyrights
© 2015 Journal of Computing