Title

Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation

Document Type

Conference Proceeding

Publisher

Security Research Centre, School of Computer and Security Science, Edith Cowan University,

Place of Publication

Perth, Western Australia

Faculty

Computing, Health and Science

School

Computer and Information Science, Centre for Security Research

RAS ID

5875

Comments

Originally published in the Proceedings of the 6th Australian Information Security Management Conference, Edith Cowan University, Perth, Western Australia, 1st to 3rd December 2006. Original article available here

Abstract

In the arena of wireless security, EAP-TLS is considered one of the most secure protocols. However since its inception the uptake has been poor and the investigation into the reasons for this are sparse. There is an industry perception that EAP-TLS is complex as well as difficult to configure and manage. One of the major barriers is in the use of public key infrastructure and the perceived difficulties in its application. The paper discusses why it is seemingly difficult to implement and how this may differ from the reality of its implementation. This premise is investigated using Windows Server 2003 to provide an argument that is in contradiction to the perception. This paper demonstrates that the processes with which the technology can now be applied have significantly improved through automation of public key infrastructure configuration and deployment.

DOI

10.4225/75/57b56501b8772

Access Rights

free_to_read

 

Link to publisher version (DOI)

10.4225/75/57b56501b8772