[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Boire et al., 2021 - Google Patents

Credential provisioning and device configuration with EAP

Boire et al., 2021

View PDF
Document ID
14194970648790058417
Author
Boire S
Akgün T
Ginzboorg P
Laitinen P
Tamrakar S
Aura T
Publication year
Publication venue
Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access

External Links

Snippet

The Extensible Authentication Protocol (EAP) is used for authenticating client devices to WiFi networks, and it is designed to be extensible with new authentication methods. We look at ways to extend the protocol to support credential provisioning and configuration of new …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0892Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0815Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0853Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal

Similar Documents

Publication Publication Date Title
US11824643B2 (en) Security lifecycle management of devices in a communications network
JP6923611B2 (en) Content security at the service layer
US8738898B2 (en) Provision of secure communications connection using third party authentication
EP1955511B1 (en) Method and system for automated and secure provisioning of service access credentials for on-line services
Funk et al. Extensible authentication protocol tunneled transport layer security authenticated protocol version 0 (EAP-TTLSv0)
Housley et al. Guidance for authentication, authorization, and accounting (AAA) key management
US20170012778A1 (en) End-To-End Service Layer Authentication
US20060259759A1 (en) Method and apparatus for securely extending a protected network through secure intermediation of AAA information
Dantu et al. EAP methods for wireless networks
Marques et al. EAP-SH: an EAP authentication protocol to integrate captive portals in the 802.1 X security architecture
Gao et al. SecT: A lightweight secure thing-centered IoT communication system
Marques et al. Integration of the Captive Portal paradigm with the 802.1 X architecture
Boire et al. Credential provisioning and device configuration with EAP
Sithirasenan et al. EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability
Reyes-Moncayo et al. Survey of the security risks of Wi-Fi networks based on the information elements of beacon and probe response frames
Boire Credential Provisioning and Peer Configuration with Extensible Authentication Protocol
Robyns Wireless network privacy
Szilagyi et al. Radius: A remote authentication dial-in user service
Rivera-Dourado et al. EAP-FIDO: A Novel EAP Method for Using FIDO2 Credentials for Network Authentication
Egners et al. Multi-operator wireless mesh networks secured by an all-encompassing security architecture
Aura et al. RFC 9140 Nimble Out-of-Band Authentication for EAP
Mortágua et al. Enhancing 802.1 X authentication with identity providers using EAP-OAUTH and OAuth 2.0
Harding et al. Wireless authentication using remote passwords
Yearbury Investigation into building large scale wireless networks with ubiquitous access
Wang et al. Design and implementation of WIRE1x