Loading

Analysis and Literature Review of IEEE 802.1x (Authentication) Protocols
Umesh Kumar1, Praveen Kumar2, Sapna Gambhir3
1Umesh Kumar,  Assistant Professor, YMCA University of Science and Technology, Faridabad, India.
2Praveen Kumar,  Research Scholar, YMCA University of Science and Technology, Faridabad, India.
3Dr. Sapna Gambhir,  Associate Professor, YMCA University of Science and Technology, Faridabad, India.
Manuscript received on May 24, 2014. | Revised Manuscript received on June 11, 2014. | Manuscript published on June 30, 2014. | PP: 163-168  | Volume-3, Issue-5, June 2014.  | Retrieval Number:  E3173063514/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper gives us detailed study of some of the commonly used EAP authentication protocol. But before understanding these authentication methods we have to understand what EAP is and how EAP work because it’s all start with EAP. So our aim in this paper is to provide detailed study of EAP and its architecture. This paper also covers literature review of authentication protocols. EAP is a frame work and it consists of different types of protocols nearly forty but we will study only those protocols which are very common in use and also their advantages and disadvantages.
Keywords:  EAP, MD5, LEAP, TLS, TTLS, PEAP.