Analysis of the Protected Extensible Authentication Protocol

Abstract

The Internet Engineering Task Force (IETF) has proposed new protocols for highly secured wireless networking. The purpose of this paper is to implement one such proposed security protocol - PEAP (Protected Extensible Authentication Protocol) [1]. PEAP was jointly developed by Microsoft, Cisco and RSA security. The protocol implementation is done on the server end of a Client/Server network model on a RADIUS server (Remote Authentication Dial-in User Service). The proposed protocol - PEAP provides for Client identity protection and key generation thus preventing unauthorized user access and protecting or encrypting the data against malicious activities.

Authors and Affiliations

Anita Rana , Dr. Rajender Singh Chhillar

Keywords

Related Articles

Performance Analysis of DSDV Protocol Using NS-2

The instantly created network does not have any base infrastructure as used in the conventional networks, but it is compatible with the conventional networks. DSDV is a modification of the conventional Bellman- Ford rout...

MARKOV CHAIN MODELING OF PERFORMANCE DEGRADATION OF PHOTOVOLTAIC SYSTEM

Modern probability theory studies chance processes for which the knowledge of previous outcomes influence predictions for future experiments. In principle, when a sequence of chance experiments, all of the past outcomes...

[b][/b]An Analysis of ASRP Secure Routing Protocol for MANET

Mobile ad hoc networks (MANET) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Each node participatin...

Apply Different Techniques to Face Vehicular Ad-Hoc Network Challenges for Making Secure Systems

In this paper, the concept of VANET is discussed in detail. The different concepts used in VANET are explained with very good style. The applications of VANET are also discussed here. In the near future, most new vehicle...

SINGLE CARRIER EQUALIZATION IN FADING DOMAIN USING SC-FDMA & LTI CHANNEL DOMAIN

In Wireless system transmission of Signal is done through mobile & broadband system. Multipath carrier transmission shows the projection to struggle doubly selective factor but for that we will use concept of single...

Download PDF file
  • EP ID EP130292
  • DOI -
  • Views 122
  • Downloads 0

How To Cite

Anita Rana, Dr. Rajender Singh Chhillar (2012). Analysis of the Protected Extensible Authentication Protocol. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 12(3), 187-191. https://europub.co.uk/articles/-A-130292