Boire et al., 2021 - Google Patents
Credential provisioning and device configuration with EAPBoire et al., 2021
View PDF- Document ID
- 14194970648790058417
- Author
- Boire S
- Akgün T
- Ginzboorg P
- Laitinen P
- Tamrakar S
- Aura T
- Publication year
- Publication venue
- Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access
External Links
Snippet
The Extensible Authentication Protocol (EAP) is used for authenticating client devices to WiFi networks, and it is designed to be extensible with new authentication methods. We look at ways to extend the protocol to support credential provisioning and configuration of new …
- 239000008186 active pharmaceutical agent 0 abstract description 18
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0892—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0815—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0853—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11824643B2 (en) | Security lifecycle management of devices in a communications network | |
JP6923611B2 (en) | Content security at the service layer | |
US8738898B2 (en) | Provision of secure communications connection using third party authentication | |
EP1955511B1 (en) | Method and system for automated and secure provisioning of service access credentials for on-line services | |
Funk et al. | Extensible authentication protocol tunneled transport layer security authenticated protocol version 0 (EAP-TTLSv0) | |
Housley et al. | Guidance for authentication, authorization, and accounting (AAA) key management | |
US20170012778A1 (en) | End-To-End Service Layer Authentication | |
US20060259759A1 (en) | Method and apparatus for securely extending a protected network through secure intermediation of AAA information | |
Dantu et al. | EAP methods for wireless networks | |
Marques et al. | EAP-SH: an EAP authentication protocol to integrate captive portals in the 802.1 X security architecture | |
Gao et al. | SecT: A lightweight secure thing-centered IoT communication system | |
Marques et al. | Integration of the Captive Portal paradigm with the 802.1 X architecture | |
Boire et al. | Credential provisioning and device configuration with EAP | |
Sithirasenan et al. | EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability | |
Reyes-Moncayo et al. | Survey of the security risks of Wi-Fi networks based on the information elements of beacon and probe response frames | |
Boire | Credential Provisioning and Peer Configuration with Extensible Authentication Protocol | |
Robyns | Wireless network privacy | |
Szilagyi et al. | Radius: A remote authentication dial-in user service | |
Rivera-Dourado et al. | EAP-FIDO: A Novel EAP Method for Using FIDO2 Credentials for Network Authentication | |
Egners et al. | Multi-operator wireless mesh networks secured by an all-encompassing security architecture | |
Aura et al. | RFC 9140 Nimble Out-of-Band Authentication for EAP | |
Mortágua et al. | Enhancing 802.1 X authentication with identity providers using EAP-OAUTH and OAuth 2.0 | |
Harding et al. | Wireless authentication using remote passwords | |
Yearbury | Investigation into building large scale wireless networks with ubiquitous access | |
Wang et al. | Design and implementation of WIRE1x |