Overview of IEEE 802.16 Security
IEEE Security and Privacy
RFID privacy issues and technical challenges
Communications of the ACM - Special issue: RFID
Journal of Network and Computer Applications
Analysis of Handover Key Management schemes under IETF perspective
Computer Standards & Interfaces
Privacy-enhanced fast re-authentication for EAP-based next generation network
Computer Communications
Secure three-party key distribution protocol for fast network access in EAP-based wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A kerberized architecture for fast re-authentication in heterogeneous wireless networks
Mobile Networks and Applications
Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations
Computer Standards & Interfaces
A wide-adapted bantam protocol for roaming across wireless areas
Wireless Networks
Addressing security challenges in WiMAX environment
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.01 |
This paper presents an overview and analysis of Extensible Authentication Protocol (EAP) and its place in securing wireless LANs. A number of specific widely used EAP methods are examined and evaluated for their advantages and susceptibility to types of attack. Next we propose suitable EAP methods for wireless technologies beyond LANs, including RFID and WiMAX. After analyzing requirements for different wireless networks, we conclude that a new lightweight and secure EAP method is warranted for fixed mobile convergence interoperability.