dc.contributor.author | Mwathi, David Gitonga 1 | |
dc.contributor.author | Okello-Odongo, William 2 , | |
dc.contributor.author | Opiyo, Elisha 3 | |
dc.date.accessioned | 2019-12-05T14:31:48Z | |
dc.date.available | 2019-12-05T14:31:48Z | |
dc.date.issued | 2016-06 | |
dc.identifier.citation | Journal of Emerging Trends in Computing and Information Sciences Vol. 7, No. 6, June 2016 | en_US |
dc.identifier.issn | ISSN 2079-8407 | |
dc.identifier.uri | http://repository.chuka.ac.ke/handle/chuka/430/submit/6b776431744d8d5f35464c0e777150590e640f1d.continue | |
dc.identifier.uri | http://repository.chuka.ac.ke/handle/chuka/521 | |
dc.description.abstract | ABSTRACT
Several recent studies indicate that many implementations of authentication and access control in public WLANs are
compromisable. This is because IEEE 802.11 standard leaves the choice of EAP method to use to the discretion of WLAN
system implementers due to the fact that IEEE 802.11 standard cannot and does not define the upper layer authentication.
Therefore, this paper presents IEEE 802.11 implementation specific issues that may contribute to poor security
performance of WLAN authentication and access control implementation. It also analyses various EAP methods and
presents an algorithm for selection of an Extensible authentication protocol (EAP) method for a Public WLAN. | en_US |
dc.language.iso | en | en_US |
dc.subject | Extensible authentication protocol, | en_US |
dc.subject | wireless LAN, | en_US |
dc.subject | attacks. | en_US |
dc.title | Algorithm for Selection of EAP Authentic | en_US |
dc.type | Article | en_US |