Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]



Download 470.11 Kb.
View original pdf
Page31/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   27   28   29   30   31   32   33   34   ...   71
FULLTEXT01
ijsrp-p4303

Figure 6 Protocol Structure - IEEE i WLAN Security Standards.
Source Javvin.
17
3.3 THE x AUTHENTICATION PROCESS
IEEE x provides a framework to authenticate and authorize devices connecting to a network. It prevents a device from accessing the network until such device is authenticated. In WLANs, three entities are involved in the authentication process a
supplicant – which is the user or client that needs to be authenticated, the authentication
server – typically a RADIUS server that does the authentication, and the authenticator – a device in between the other two, for example a wireless access point. IEEE X also provides a framework to transmit key information between authenticator and supplicant.
The X protocol is an end-to-end communication authentication process between the supplicant and the authentication server (AS, the authenticator serves as the channel for the passage of the authentication messages. EAP encapsulation over LAN (EAPOL) protocol is the means of communication between the supplicant and the authenticator, whereas the authenticator and the AS communicate through RADIUS. x protocol

Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude Arinze Sunday
- 18 - supports several other different authentication protocols in addition to RADIUS such as Diameter, and Kerberos. Also, the x can be implemented with different EAP types. Figure 7 illustrates the communication paths of the supplicant, the authenticator and the authenticator server, and the X authentication process.

Download 470.11 Kb.

Share with your friends:
1   ...   27   28   29   30   31   32   33   34   ...   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page