Simulation of EAP method selection and negotiation mechanism

Bhakti, M.A.C. and Abdullah, A. and Low, T.J. (2008) Simulation of EAP method selection and negotiation mechanism. In: UNSPECIFIED.

Full text not available from this repository.
Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

Authentication is an important aspect in network security, especially in wireless network where unauthorized user can gain access to the network without any physical access. One of the authentication protocols that have been used in wireless networks is the Extensible Authentication Protocol (EAP). This paper discusses the simulation development and simulation results of a mechanism to select and negotiate the suitable EAP method to be used in EAP authentication between two nodes. © 2008 IEEE.

Item Type: Conference or Workshop Item (UNSPECIFIED)
Additional Information: cited By 0; Conference of International Symposium on Information Technology 2008, ITSim ; Conference Date: 26 August 2008 Through 29 August 2008; Conference Code:74115
Uncontrolled Keywords: Access control; Authentication; Information technology; Internet, Authentication protocols; EAP methods; Extensible authentication protocols; Gain accesses; Negotiation mechanisms; Physical accesses; Simulation developments; Simulation results; Unauthorized users, Wireless networks
Depositing User: Mr Ahmad Suhairi UTP
Date Deposited: 09 Nov 2023 15:15
Last Modified: 09 Nov 2023 15:15
URI: https://khub.utp.edu.my/scholars/id/eprint/316

Actions (login required)

View Item
View Item