@inproceedings{scholars219, address = {Selangor}, title = {EAP-based authentication with EAP method selection mechanism: Simulation design}, journal = {2007 5th Student Conference on Research and Development, SCORED}, doi = {10.1109/SCORED.2007.4451356}, year = {2007}, note = {cited By 1; Conference of 2007 5th Student Conference on Research and Development, SCORED ; Conference Date: 11 December 2007 Through 12 December 2007; Conference Code:73256}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-50449091713&doi=10.1109\%2fSCORED.2007.4451356&partnerID=40&md5=0023ca5c7316583dced2e991cf366cb7}, keywords = {Authentication; Computer networks; Computer simulation; Internet; Machine design; Mechanisms; Research and development management, Design; Extensible authentication protocol (EAP); Modeling; Simulation, Wireless networks}, abstract = {Wireless networks have grown rapidly and more becoming part of our life, due to its advantages over the wired network, such as convenience, mobility, and flexibility. However the security concerns in wireless networks might have prevented its further widespread adoption. One of the solutions to overcome the wireless network security concerns is the IEEE 802.1X specification, a mechanism for port-based network access control, which is based on Extensible Authentication Protocol (EAP), an authentication framework that can support multiple authentication methods. This paper proposed a design for an extension to the EAP framework for EAP authentication method selection purpose. The design then can be used to develop a simulation model of the EAP method selection mechanism. {\^A}{\copyright}2007 IEEE.}, author = {Catur Bhakti, M. A. and Abdullah, A. and Jung, L. T.}, isbn = {1424414709; 9781424414703} }