The field of authentication is a very well explored one and has seen many years of research and standardization. It seems however that with the advent of many new wireless and wired network technologies and many new services and application, this field is still going through a serious expansion as well as large number of customizations. For those reasons, it is very difficult for us to provide a comprehensive list of resources for further study; so we simply opt to provide links for the technologies that are covered in this chapter. Also the aim of this book is to provide a much better understanding of the various authentication issues for various scenarios throughout this book, so we are by no means done with the topic of authentication at this point.
Here are a few links to topics discussed in this chapter
More information on EAP can be found on the IETF EAP working group website: http://www.ietf.org/html.charters/eap-charter.html.
More information on PPP and its extensions can be found at the concluded IETF PPP working group website http://www.ietf.org/html.charters/OLD/ppp-charter.html and the PPP extension working group website http://www.ietf.org/html.charters/pppext-charter. html and book written by J. Carlson [PPPCARL].
There is a new working group formed in IETF that works on the problem of allowing the clients to authenticate themselves to the access network using the IP protocol. The name of the group is "protocol for carrying authentication for ...