Provided by: International Journal of Engineering and Advanced Technology (IJEAT)
Date Added: Jun 2014
In this paper, the authors explain about some of the commonly used Extensible Authentication Protocol (EAP) authentication protocol. But before understanding these authentication methods they have to understand what EAP is and how EAP work because it's all start with EAP. So their aim in this paper is to provide detailed study of EAP and its architecture. This paper also covers literature review of authentication protocols. EAP is a frame work and it consists of different types of protocols nearly forty but they will study only those protocols which are very common in use and also their advantages and disadvantages.