Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Extensible Authentication Protocol (EAP)

Handbook of Research on Wireless Security
A protocol used between a user station and an authenticator or authentication server. It acts as a transport for authentication methods or types. It in turn may be encapsulated in other protocols, such as 802.1x and RADIUS.
Published in Chapter:
Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANs)
Giorgos Kostopoulos (University of Patras, Greece), Nicolas Sklavos (Technological Educational Institute of Mesolonghi, Greece), and Odysseas Koufopavlou (University of Patras, Greece)
Copyright: © 2008 |Pages: 15
DOI: 10.4018/978-1-59904-899-4.ch046
Abstract
Wireless communications are becoming ubiquitous in homes, offices, and enterprises with the popular IEEE 802.11 wireless local area network (LAN) technology and the up-and-coming IEEE 802.16 wireless metropolitan area networks (MAN) technology. The wireless nature of communications defined in these standards makes it possible for an attacker to snoop on confidential communications or modify them to gain access to home or enterprise networks much more easily than with wired networks. Wireless devices generally try to reduce computation overhead to conserve power and communication overhead to conserve spectrum and battery power. Due to these considerations, the original security designs in wireless LANs and MANs used smaller keys, weak message integrity protocols, weak or one-way authentication protocols, and so forth. As wireless networks became popular, the security threats were also highlighted to caution users. A security protocol redesign followed first in wireless LANs and then in wireless MANs. This chapter discusses the security threats and requirements in wireless LANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols. It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues. Our aim is to provide the reader with a single source of information on security threats and requirements, authentication technologies, security encapsulation, and key management protocols relevant to wireless LANs and MANs.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Security Architectures for B3G Mobile Networks
EAP is a security framework used to provide a plethora of authentications options, called EAP methods.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication, Authorisation, and Access Control in Mobile Systems
EAP, a flexible protocol family, which includes TLS, IKE protocols, and also the default authentication method of UMTS, EAP-AKA.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR