Academic Journals Database
Disseminating quality controlled scientific knowledge

ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

ADD TO MY LIST
 
Author(s): Amit Rana | Dr. Rajender Singh Chhillar

Journal: International Journal of Computer Science and Management Studies
ISSN 2231-5268

Volume: 12;
Issue: 03;
Start page: 187;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Wireless LAN | Authentication Protocol.

ABSTRACT
The Internet Engineering Task Force (IETF) has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol) [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service). The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

Tango Jona
Tangokurs Rapperswil-Jona

     Save time & money - Smart Internet Solutions