Classification of EAP methods and Some Major Attacks on EAP

Main Article Content

Meenu Katoch, Randhir Bhandari

Abstract

This paper presents an overview of authentication protocol and analysis of Extensible Authentication Protocol (EAP) and its place in securing network. In general, authentication procedure adds extra messages to the original message flow and results in throughput reduction/ increase in processing time. Extensible Authentication Protocol (EAP) is a framework which aims to provide a flexible authentication for wireless networks. A number of specific widely used EAP methods are examined and evaluated for their advantages and susceptibility to types of attack. In addition, we evaluate how we communicate between two entities over the network.

Article Details

How to Cite
, M. K. R. B. (2016). Classification of EAP methods and Some Major Attacks on EAP. International Journal on Recent and Innovation Trends in Computing and Communication, 4(2), 145–148. https://doi.org/10.17762/ijritcc.v4i2.1780
Section
Articles