Research on the 802.1x Authentication Mechanism and Existing Defects

Article Preview

Abstract:

The IEEE 802.1x protocol inherits the advantage of IEEE802.1x LAN and provides a measure to authenticate and authorize the user(or device) which has connected to the local area network.But there are some defects in existing authentication mode based on 802.1x,to control the illegal users.We analysis the working mechanism of 802.1x and the principle of illegal users to access the network.Then the improved method based on monitoring the online users is proposed.It added a detecting module to the authentication server and make use of the interaction between Radius server and client to ensure the accuracy of the list of online users.It can effectively separate unauthorized users from network and protect tht authentication security of the campus network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

385-389

Citation:

Online since:

July 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] IEEE Std 802. 1x-2001. 802. 1x Standard for Local and metropolitan area networks, Port-based Network Access Control[S].

DOI: 10.1109/ieeestd.2013.6679204

Google Scholar

[2] RFC 2905. August 2000, AAA Authorization Application Examples[S].

Google Scholar

[3] Xu, Xing, Wang, Lei. The Improvement & Implementation of EAPOL Supplicant State Machine Based on IEEE802. 1X, Microcomputer Information, 2006, 27(22): 146-148.

Google Scholar

[4] YU Cheng-bin. Study on the authentication mechanism and flaws of 802. 1x protocol, Information Technology, 2006(11): 94-96.

Google Scholar

[5] Dong Xuesen. The Scheme of Identity Authentication and Adminstration of Ip Address in Campus Network, Journal of Taizhou Polytechnical Institute, 2006, 3(6 ): 38-42.

Google Scholar

[6] Dong Zhenliang , Lv Shuwang, Wang Zhaoshun, Design of Authentication Model of Intranet Security Management System Management System Based on 802. 1X, Computer Engineering, 2007(12): 105-109.

Google Scholar

[7] QIN Liu, ZHI Yingjian, HE Lei, Research on 802. 1x Protocol and Its Security Analysis, Computer Engineering, 2007(07): 83-89.

Google Scholar