Show simple item record

dc.contributor.authorMwathi, David Gitonga 1
dc.contributor.authorOkello-Odongo, William 2 ,
dc.contributor.authorOpiyo, Elisha 3
dc.date.accessioned2019-12-05T14:31:48Z
dc.date.available2019-12-05T14:31:48Z
dc.date.issued2016-06
dc.identifier.citationJournal of Emerging Trends in Computing and Information Sciences Vol. 7, No. 6, June 2016en_US
dc.identifier.issnISSN 2079-8407
dc.identifier.urihttp://repository.chuka.ac.ke/handle/chuka/430/submit/6b776431744d8d5f35464c0e777150590e640f1d.continue
dc.identifier.urihttp://repository.chuka.ac.ke/handle/chuka/521
dc.description.abstractABSTRACT Several recent studies indicate that many implementations of authentication and access control in public WLANs are compromisable. This is because IEEE 802.11 standard leaves the choice of EAP method to use to the discretion of WLAN system implementers due to the fact that IEEE 802.11 standard cannot and does not define the upper layer authentication. Therefore, this paper presents IEEE 802.11 implementation specific issues that may contribute to poor security performance of WLAN authentication and access control implementation. It also analyses various EAP methods and presents an algorithm for selection of an Extensible authentication protocol (EAP) method for a Public WLAN.en_US
dc.language.isoenen_US
dc.subjectExtensible authentication protocol,en_US
dc.subjectwireless LAN,en_US
dc.subjectattacks.en_US
dc.titleAlgorithm for Selection of EAP Authenticen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record