Document Type

Technical Report

Publication Date

11-1-2004

Technical Report Number

TR2004-524

Abstract

In the new standards for WLAN security, many choices exist for the authentication process. In this paper, we list eight desired properties of WLAN authentication protocols, survey eight recent authentication protocols, and analyze the protocols according to the desired properties.

Share

COinS