ITU-T X.1034 PDF

ITU-T X.1034 PDF

Name:
ITU-T X.1034 PDF

Published Date:
02/01/2011

Status:
[ Active ]

Description:

Guidelines on extensible authentication protocol based authentication and key management in a data communication network

Publisher:
International Telecommunication Union-T

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$12.3
Need Help?

The extensible authentication protocol (EAP) is an authentication framework that supports multiple authentication mechanisms between a supplicant and an authentication server. EAP can work directly over lower layers, e.g., the data link layer, such as the point-to-point protocol (PPP), IEEE 802, CDMA2000, UMTS, or VDSL/ADSL. For example, IEEE 802.1X is a typical transport mechanism for EAP over 802 LANs. The EAP basically performs authentication for a device attached to a LAN, establishing a secure point-to-point connection or preventing access by an unauthorized device. In other words, EAP can be used to authenticate the supplicant wishing to access the network. The AAA function may be used as one of the key functions for lower-layer security of a data communication network. AAA enables transporting the secret key from the authentication server to the authenticator. Thus, defining the requirements of the EAP method and key management protocol, establishing criteria for selecting an optimal EAP method among several existing EAP methods, and defining a suitable framework for EAP and an optimal key management protocol including key derivation methods for lower-layer security in end-to-end data communication are essential. This Recommendation applies mainly to EAP-based authentication and key management protocol for data communication with a wireless access network where communication through the wireless access network should be protected by the key material derived from the key management protocol.

This Recommendation describes a framework for authentication and key management to secure the lower layer in data communication. It also provides guidance on the selection of EAP methods for a data communication network and describes the mechanism for key management and possible key hierarchy for lower-layer security in a data communication network. This Recommendation is to provide complete sets for EAP-based authentication itself but also the key management, from threat analysis to requirements, allowing the network operator to choose an adequate EAP method by using some criteria described for a specific network environment.


Edition : 11
File Size : 1 file
Number of Pages : 36
Published : 02/01/2011

History

ITU-T X.1034
Published Date: 02/01/2011
Guidelines on extensible authentication protocol based authentication and key management in a data communication network
$12.3
ITU-T X.1034
Published Date: 04/01/2008
Guidelines on extensible authentication protocol based authentication and key management in a data communication network

Related products

ITU-T I.370
Published Date: 10/01/1991
CONGESTION MANAGEMENT FOR THE ISDN FRAME RELAYING BEARER SERVICE
$7.8
ITU-T O.81
Published Date: 11/01/1988
Group-delay measuring equipment for telephone-type circuits
$19.5
ITU-T RÉSOLUTION 50 FRENCH
Published Date: 10/01/2008
Cybersécurité
$6
ITU-T M.340
Published Date: 11/01/1988
NUMBERING OF SUPERGROUPS WITHIN A MASTERGROUP
$6

Best-Selling Products

NG AMBP 051
Published Date: 09/01/2010
Asset Management Business Procedure - The Implementation of Construction (Design & Management) Regulations (CDM) 2007. Delivery of Asset Management Maintenance Delivery Electricity Minor Schemes
$138
NG AMBP 051
Published Date: 08/01/2015
Asset Management Business Procedure - Implementation of Construction (Design & Management) Regulations (CDM) 2015. Delivery of ETAM Operation Projects and Temporary Works Coordination for Construction
$138
NG AMBP 130
Published Date: 06/01/2018
Asset Management Business Procedure - Management of OHL Work in ETO Operations
$138
NG AMBP 130
Published Date: 02/01/2011
Asset Management Business Procedure - Guidance for Planning of Work on or Near to High Voltage Overhead Lines
$138
NG AMBP 136
Published Date: 10/01/2013
Asset Management Business Procedure - Working at Height Standards – Overhead Lines
NG AMBP 136
Published Date: 01/01/2015
Asset Management Business Procedure - Working at Height Standards – Overhead Lines
$138