Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation
Document Type
Conference Proceeding
Publisher
Security Research Centre, School of Computer and Security Science, Edith Cowan University,
Place of Publication
Perth, Western Australia
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science / Centre for Security Research
RAS ID
5875
Abstract
In the arena of wireless security, EAP-TLS is considered one of the most secure protocols. However since its inception the uptake has been poor and the investigation into the reasons for this are sparse. There is an industry perception that EAP-TLS is complex as well as difficult to configure and manage. One of the major barriers is in the use of public key infrastructure and the perceived difficulties in its application. The paper discusses why it is seemingly difficult to implement and how this may differ from the reality of its implementation. This premise is investigated using Windows Server 2003 to provide an argument that is in contradiction to the perception. This paper demonstrates that the processes with which the technology can now be applied have significantly improved through automation of public key infrastructure configuration and deployment.
DOI
10.4225/75/57b56501b8772
Access Rights
free_to_read
Comments
Proceedings of the 6th Australian Information Security Management Conference, Edith Cowan University, Perth, Western Australia, 1st to 3rd December 2006. Available here