Title

Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation

Document Type

Conference Proceeding

Publisher

Security Research Centre, School of Computer and Security Science, Edith Cowan University,

Place of Publication

Perth, Western Australia

Faculty

Computing, Health and Science

School

Computer and Information Science, Centre for Security Research

RAS ID

5875

Comments

Originally published in the Proceedings of the 6th Australian Information Security Management Conference, Edith Cowan University, Perth, Western Australia, 1st to 3rd December 2006.

Abstract

In the arena of wireless security, EAP-TLS is considered one of the most secure protocols. However since its inception the uptake has been poor and the investigation into the reasons for this are sparse. There is an industry perception that EAP-TLS is complex as well as difficult to configure and manage. One of the major barriers is in the use of public key infrastructure and the perceived difficulties in its application. The paper discusses why it is seemingly difficult to implement and how this may differ from the reality of its implementation. This premise is investigated using Windows Server 2003 to provide an argument that is in contradiction to the perception. This paper demonstrates that the processes with which the technology can now be applied have significantly improved through automation of public key infrastructure configuration and deployment.

 

Link to publisher version (DOI)

10.4225/75/57b56501b8772