WEBREVIEW

Improving the security of EAP-EHash authentication method

Several EAP authentication methods have recently been proposed to ensure authentication in 802.11 wireless networks. Most of these methods require high computation cost for the purpose of security. However, they are not suitable for use in a resource constrained network environment. EAP-EHash is one of the very few interesting methods, which were designed for use in such environment. EAP-EHash requires low computation cost and combines simplicity and security. In this paper, we show that EAP-EHash suffers from serious security defects. Then, we propose improvements to correct these flaws.


Document joint


 
| info visites 3373025

Suivre la vie du site fr  Suivre la vie du site Informatique, science de l’information et bibliothéconomie  Suivre la vie du site RIST  Suivre la vie du site Volume 18  Suivre la vie du site Numéro 02   ?

Creative Commons License