Analysis of the Protected Extensible Authentication Protocol

Abstract

The Internet Engineering Task Force (IETF) has proposed new protocols for highly secured wireless networking. The purpose of this paper is to implement one such proposed security protocol - PEAP (Protected Extensible Authentication Protocol) [1]. PEAP was jointly developed by Microsoft, Cisco and RSA security. The protocol implementation is done on the server end of a Client/Server network model on a RADIUS server (Remote Authentication Dial-in User Service). The proposed protocol - PEAP provides for Client identity protection and key generation thus preventing unauthorized user access and protecting or encrypting the data against malicious activities.

Authors and Affiliations

Anita Rana , Dr. Rajender Singh Chhillar

Keywords

Related Articles

FUZZY NEURAL NETWORKS

This paper comparator networks - a well-known model of parallel computation. This model is used extensively for keys arrangement tasks such as sorting and selection. This work investigates several aspects of comparator n...

A Novel Security Approach in Mobile Agent Using Encryption

The appearance of software agents has given rise too much discussion of what such an agent is and how it differs from programs in general. An agent is anything that can be viewed as perceiving its environment through sen...

AN IMPROVED FUZZY MODEL TO PREDICT SOFTWARE RELIABILITY

Software faults are one of major criteria to estimate the software quality or the software reliability. There are number of matrices defined that uses the software faults to estimate the software quality. But when we hav...

A Review on Advanced Traffic Control Techniques in Mobile Ad-Hoc Network

A mobile ad hoc network (MANET) is a dynamic distributed system of wireless nodes that move independently of each other. The operating transmission range of the nodes is limited and as a result, MANET routes are often m...

Effect of Line-Width Variation in Radio over Fiber System Based On Optical Single Side Band for Short Haul Communication

Carrier to Noise Ratio (CNR) has been investigated for radio over fiber systems including the effects of variation in the RF oscillator linewidth in this paper. Optical Single sideband signal is studied as it has tolera...

Download PDF file
  • EP ID EP130292
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Anita Rana, Dr. Rajender Singh Chhillar (2012). Analysis of the Protected Extensible Authentication Protocol. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 12(3), 187-191. https://europub.co.uk/articles/-A-130292