{"title":"基于802.1x认证的AAA消息研究","authors":"Jiange Zhang, Yuanbo Guo, Yue Chen, Jun Ma","doi":"10.1109/IAEAC.2015.7428627","DOIUrl":null,"url":null,"abstract":"It has obvious advantage to adopt 802.1x authentication for network access control. This paper analyzes 802.1x protocol, EAP protocol and RADIUS protocol, and constructs AAA which is based on 802.1x authentication at the end. Using software the messages of the whole authentication process have been captured. According to AAA mechanism it analyzes EAP messages and RADIUS messages detailedly. The analysis of these messages provides technology strongly for particular research and further improvement, and it has important value for research and application.","PeriodicalId":398100,"journal":{"name":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research of AAA messages Based on 802.1x authentication\",\"authors\":\"Jiange Zhang, Yuanbo Guo, Yue Chen, Jun Ma\",\"doi\":\"10.1109/IAEAC.2015.7428627\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It has obvious advantage to adopt 802.1x authentication for network access control. This paper analyzes 802.1x protocol, EAP protocol and RADIUS protocol, and constructs AAA which is based on 802.1x authentication at the end. Using software the messages of the whole authentication process have been captured. According to AAA mechanism it analyzes EAP messages and RADIUS messages detailedly. The analysis of these messages provides technology strongly for particular research and further improvement, and it has important value for research and application.\",\"PeriodicalId\":398100,\"journal\":{\"name\":\"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IAEAC.2015.7428627\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAEAC.2015.7428627","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research of AAA messages Based on 802.1x authentication
It has obvious advantage to adopt 802.1x authentication for network access control. This paper analyzes 802.1x protocol, EAP protocol and RADIUS protocol, and constructs AAA which is based on 802.1x authentication at the end. Using software the messages of the whole authentication process have been captured. According to AAA mechanism it analyzes EAP messages and RADIUS messages detailedly. The analysis of these messages provides technology strongly for particular research and further improvement, and it has important value for research and application.