CONTENTS

 

 1     Scope 
 2     References 
 3     Terms and definitions       
        3.1     Terms from [IETF RFC 4017] and their definitions 
        3.2     Terms from [ITU-T X.1151] and their definitions   
        3.3     Terms from [ISO/IEC 8802-11] and their definitions          
        3.4     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     EAP-based authentication and key management framework          
        6.1     Introduction           
        6.2     General features of EAP    
        6.3     Basic operational procedures for authentication and key management protocols      
 7     EAP protocols  
        7.1     Vulnerabilities in EAP        
        7.2     Set of requirements for EAP          
        7.3     Criteria for evaluating and classifying EAP methods
        7.4     EAP method          
        7.5     Evaluation of existing EAP methods
 8     Key management 
        8.1     Practical threats to a specific wireless access network         
        8.2     General operational phases for key management     
        8.3     Set of requirements for key management    
        8.4     General flow of key management protocol  
        8.5     Requirements classification of key management       
 9     Cryptographic key for key management   
        9.1     General policy model         
        9.2     Possible cryptographic key hierarchy and key derivation     
Appendix I – Evaluation of existing EAP methods     
Appendix II AAA protocol     
Bibliography