Improving the security of EAP-EHash authentication method
,
,
Several EAP authentication methods have recently been proposed to ensure authentication in 802.11 wireless networks. Most of these methods require high computation cost for the purpose of security. However, they are not suitable for use in a resource constrained network environment. EAP-EHash is one of the very few interesting methods, which were designed for use in such environment. EAP-EHash requires low computation cost and combines simplicity and security. In this paper, we show that EAP-EHash suffers from serious security defects. Then, we propose improvements to correct these flaws.
Mots-clés
- 802.1x
-
Authentification
-
- Authentification et Identification de Visages basées sur les Ondelettes et les Réseaux de Neurones.
- Authentification et distribution de clés pour les communications Multicast
- Un nouveau schéma d’authentification pour le protocole Mobile IP
- L’Authentification dans les réseaux ad hoc
- Un système d`authentification avancé basé sur la technique OTP
- Eap
- Security
- Wireless network
Se connecter |
info visites 9230734
fr
Informatique, science de l’information et bibliothéconomie
RIST
Volume 18
Numéro 02
?