{"title":"EAP-FAST协议分析","authors":"Bakytbek Eshmurzaev, G. Dalkılıç","doi":"10.2498/iti.2012.0429","DOIUrl":null,"url":null,"abstract":"One of the core security concepts of Wireless LAN is the authentication. An 802.1X/EAP framework allows a variety of specific methods to be used for the authentication. Certificate-based authentication methods provide strong security as well as allow shared key-based methods to be used. This paper analyzes wide deployed TLS-based EAP protocols defined in RFCs, used in WLAN. We mainly focus on the EAP-FAST protocol because it differs from other TLS-based EAP types on using shared secret keys instead of certificates, thus significantly increasing performance. We validated different authentication scenarios of EAP-FAST protocol using AVISPA model checker.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Analysis of EAP-FAST protocol\",\"authors\":\"Bakytbek Eshmurzaev, G. Dalkılıç\",\"doi\":\"10.2498/iti.2012.0429\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the core security concepts of Wireless LAN is the authentication. An 802.1X/EAP framework allows a variety of specific methods to be used for the authentication. Certificate-based authentication methods provide strong security as well as allow shared key-based methods to be used. This paper analyzes wide deployed TLS-based EAP protocols defined in RFCs, used in WLAN. We mainly focus on the EAP-FAST protocol because it differs from other TLS-based EAP types on using shared secret keys instead of certificates, thus significantly increasing performance. We validated different authentication scenarios of EAP-FAST protocol using AVISPA model checker.\",\"PeriodicalId\":135105,\"journal\":{\"name\":\"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2498/iti.2012.0429\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2498/iti.2012.0429","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
One of the core security concepts of Wireless LAN is the authentication. An 802.1X/EAP framework allows a variety of specific methods to be used for the authentication. Certificate-based authentication methods provide strong security as well as allow shared key-based methods to be used. This paper analyzes wide deployed TLS-based EAP protocols defined in RFCs, used in WLAN. We mainly focus on the EAP-FAST protocol because it differs from other TLS-based EAP types on using shared secret keys instead of certificates, thus significantly increasing performance. We validated different authentication scenarios of EAP-FAST protocol using AVISPA model checker.