Academic Journals Database
Disseminating quality controlled scientific knowledge

Hierarchical EAP Back-End Authenticator State Machine

ADD TO MY LIST
 
Author(s): Desai Malav | Kalpesh Patel

Journal: International Journal of Computer Science and Mobile Computing
ISSN 2320-088X

Volume: 2;
Issue: 5;
Start page: 162;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Extended Authentication Protocol | EAP | EAP state machines | EAP peer | Back-end State Machine | Hierarchical Approach

ABSTRACT
Authentication is a basic requirement for telecommunication network market for allowingresources to the legitimate users. Extended Authentication Protocol (EAP) is a widely used protocol forauthentication. EAP is basically a framework which supports several authentication methods. The severalauthentication methods supported by a single protocol make this protocol a complex one. To simplify thisComplexity State Machines are used. Extended Authentication Protocol (EAP) also has the state machinesprovided by Internet Engineering Task Force (IETF). 1) EAP peer 2) EAP stand-alone authenticator whichis non-pass-through 3) EAP backend authenticator which is used for Authentication, Authorization, andAccounting (AAA) servers, and 4) EAP full authenticator which is for both local and pass-through, are fourstate machines presented by IETF. These states machines are created using basic single level state machinewhich reduces the complexity of state machine up to some point. In this paper we will see how we can reducethe architectural complexity using Hierarchical State Machine. Here we will try to represent the hierarchicalstate machine structure and implement it for the Back-end Authenticator State Machine.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions