2008
DOI: 10.17487/rfc5216
|View full text |Cite
|
Sign up to set email alerts
|

The EAP-TLS Authentication Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
112
0
1

Year Published

2009
2009
2016
2016

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 145 publications
(119 citation statements)
references
References 7 publications
1
112
0
1
Order By: Relevance
“…This process allows the supplicant to maintain its privacy as it does not disclose its authentication credentials to an intermediate AP or AN, but ensures that these are only transmitted to the AAA server over the tunnel they have established. Of particular importance for our research are EAP-TLS [13] and EAP-TTLS [5]. During Phase 2, where the AAA server authenticates the client, EAP-TLS uses a client's certificate, whereas EAP-TTLS uses a password in a hashed format, usually dictated by another authentication mechanism such as CHAP.…”
Section: Tls Based Authentication Methodsmentioning
confidence: 99%
“…This process allows the supplicant to maintain its privacy as it does not disclose its authentication credentials to an intermediate AP or AN, but ensures that these are only transmitted to the AAA server over the tunnel they have established. Of particular importance for our research are EAP-TLS [13] and EAP-TTLS [5]. During Phase 2, where the AAA server authenticates the client, EAP-TLS uses a client's certificate, whereas EAP-TTLS uses a password in a hashed format, usually dictated by another authentication mechanism such as CHAP.…”
Section: Tls Based Authentication Methodsmentioning
confidence: 99%
“…o Extensible Authentication Protocol-TLS (EAP-TLS) [RFC5216] MUST be used at the next layer to carry the TLS records for the authentication protocol.…”
Section: Authentication Stackmentioning
confidence: 99%
“…The Wireless Protected Access 802.11i (WPA / WPA2) protocol [20] requires AES in two-pass CCM [29] mode to implement its CCMP protocol and SHA-1 [30] for key derivation. Furthermore TLS-based EAP-TLS [31] authentication is recommended.…”
Section: Legacy Record and Transport Protocolsmentioning
confidence: 99%