Analysis of the Protected Extensible Authentication Protocol

Abstract

The Internet Engineering Task Force (IETF) has proposed new protocols for highly secured wireless networking. The purpose of this paper is to implement one such proposed security protocol - PEAP (Protected Extensible Authentication Protocol) [1]. PEAP was jointly developed by Microsoft, Cisco and RSA security. The protocol implementation is done on the server end of a Client/Server network model on a RADIUS server (Remote Authentication Dial-in User Service). The proposed protocol - PEAP provides for Client identity protection and key generation thus preventing unauthorized user access and protecting or encrypting the data against malicious activities.

Authors and Affiliations

Anita Rana , Dr. Rajender Singh Chhillar

Keywords

Related Articles

Web Crawler: A Review

In a large distributed system like the Web, users find resources by following hypertext links from one document to another. When the system is small and its resources share the same fundamental purpose, users can find r...

Collection of Data in Secure Way in Wireless Sensor Networks

Wireless Sensor Networks make it possible to send secure data from source to destination. If applied to network monitoring data on a host, they can used to detect compromised node and denial-of-service is two key attacks...

LDPC CODED ADVANCED COMMUNICATION SYSTEM WITH IMPROVED PAPR

In this paper LDPC coded communication system are proposed using MATLAB to provide excellent error performance under extreme noisy channel conditions of different data rate applications with suitable modulation schemes a...

A 3-D Switching Median Filter with Colour Correction for Removal of Random Valued Impulse Noise from Colour Videos

This paper presents a three dimensional switching median filter with colour correction to remove random valued impulse noise from colour video sequences. The switching median technique is utilized to protect noise free i...

SMS BASED REMOTE CONTROL SYSTEM

A modern world contains varieties of electronic equipment and systems like: TV, security system, Hi-fi equipment, central heating systems, fire alarm systems, security alarm systems, lighting systems, SET Top Box, AC (Ai...

Download PDF file
  • EP ID EP130292
  • DOI -
  • Views 121
  • Downloads 0

How To Cite

Anita Rana, Dr. Rajender Singh Chhillar (2012). Analysis of the Protected Extensible Authentication Protocol. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 12(3), 187-191. https://europub.co.uk/articles/-A-130292