Loading...
Please wait, while we are loading the content...
Authentication in wireless networks.
| Content Provider | CiteSeerX |
|---|---|
| Author | Bansal, Divya Lalar, Sachin |
| Abstract | Broadband wireless access networks based on WiMAX can provide backhaul support for mobile WiFi hotspots. We consider an integrated WiMAX / WiFi network for different application where the licensed WiMAX spectrum is shared by the WiFi access points to provide Internet connectivity to mobile WiFi users.This type of development is suffering today from different security problems due to the fact that it is a wireless technology. In the cryptographic scenario authentication protocols play an important role. This paper will focus on the importance of this kind of cryptographic tools in the emergent technology of wireless networks. The alternatives for authentication in this setting will be introduced and some of their weaknesses will be pointed out.The Extensible Authentication Protocol (EAP) is widely used in WiFi/802.11 and WiMax/802.16 wireless networks as an authentication solution. This paper uncovers the main threats to EAP and some common EAP methods. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Wireless Network Important Role Extensible Authentication Protocol Different Application Common Eap Method Wimax Wifi Network Wireless Technology Emergent Technology Internet Connectivity Mobile Wifi Hotspot Broadband Wireless Access Network Licensed Wimax Spectrum Main Threat Cryptographic Tool Different Security Problem Cryptographic Scenario Authentication Protocol Wifi Access Point Authentication Solution Wifi User |
| Content Type | Text |
| Resource Type | Article |