@inproceedings{scholars156, doi = {10.1109/ICIAS.2007.4658415}, year = {2007}, note = {cited By 6; Conference of 2007 International Conference on Intelligent and Advanced Systems, ICIAS 2007 ; Conference Date: 25 November 2007 Through 28 November 2007; Conference Code:74506}, pages = {393--396}, address = {Kuala Lumpur}, title = {EAP-based authentication with EAP method selection mechanism}, journal = {2007 International Conference on Intelligent and Advanced Systems, ICIAS 2007}, abstract = {Wireless network has grown rapidly in the past few years due to its advantages over the wired network, such as mobility, flexibility, convenience, and rapid deployment. But it also introduces new security issues due to its nature, i.e. it does not need any physical access. One of the solutions to overcome the limitation of wireless network security is the IEEE 802.1X specification, a mechanism for port-based network access control, which is based on Extensible Authentication Protocol (EAP), an authentication framework that can support multiple authentication methods. We propose extension to the EAP framework for authentication method selection purpose, in order to reduce the number of fail authentication due to unsuitable EAP method used for the authentication. The selection will be based on some criteria such as the node resources, previous authentication and communication records. {\^A}{\copyright}2007 IEEE.}, keywords = {Authentication; Internet; Wireless networks, Authentication methods; EAP methods; Extensible authentication protocol (EAP); IEEE 802.1X; Network access controls; Physical accesses; Security issues; Selection mechanisms; Wired networks; Wireless network securities, Access control}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-57949111554&doi=10.1109\%2fICIAS.2007.4658415&partnerID=40&md5=6a1789903cf3051b65e3a06a216f1c34}, isbn = {1424413559; 9781424413553}, author = {Catur Bhakti, M. A. and Abdullah, A. and Jung, L. T.} }