Main Article Content
Improving the security of EAP-EHash authentication method
Abstract
Several EAP authentication methods have recently been proposed to ensure authentication in 802.11 wireless networks. Most of these methods require high computation cost for the purpose of security. However, they are not suitable for use in a resource constrained network environment. EAP-EHash is one of the very few interesting methods, which were designed for use in such environment. EAP-EHash requires low computation cost and combines simplicity and security. In this paper, we show that EAP-EHash suffers from serious security defects. Then, we propose improvements to correct these flaws.
Keywords: Security, Authentication, Wireless network, 802.1X, EAP