O'Reilly logo

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility by Madjid Nakhjiri, Mahsa Nakhjiri

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

10.5. Further Resources

A wealth of information on authentication methods including EAP-based authentication methods can be found at the IETF PPP extension working group website: http://ietf.org/html.charters/pppext-charter.html

A newly formed IETF working group is working specifically on EAP standardization issues such as EAP key management framework and use of EAP for network discovery. This group has also specified the new design for EAP. The website is found at http://ietf.org/html.charters/eap-charter.html

Furthermore, a new specification on the requirement for usage of EAP for wireless LANS is now commonly used a criterion for gauging correctness of any deployment-specific key management architecture that is based on the EAP key management framework [EAP80211REQ].

More information about newest authentication methods can be found at IEEE 802 standards web page at http://ietf.org/html.charters/eap-charter.html.

More information on Wi-Fi alliance can be found at http://www.wi-fi.org/OpenSection/index.asp.

Finally, Edney and Arbaugh have written an excellent book [EDARB80211] on the latest 802.11 security procedures such as WPA and RSN as well as older security procedures. In the process they explain many other concepts such as TLS, RADIUS and so on.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required