CONTENTS

 

�1��� �Scope�
2��� �References�
3��� �Terms and definitions�������
������ �3.1��� �Terms from [IETF RFC 4017] and their definitions�
������ �3.2��� �Terms from [ITU-T X.1151] and their definitions���
������ �3.3��� �Terms from [ISO/IEC 8802-11] and their definitions����������
������ �3.4��� �Terms defined in this Recommendation�������
4��� �Abbreviations and acronyms��������
5��� �Conventions�����
6��� �EAP-based authentication and key management framework����������
������ �6.1��� �Introduction�����������
������ �6.2��� �General features of EAP����
������ �6.3��� �Basic operational procedures for authentication and key management protocols������
7��� �EAP protocols��
������ �7.1��� �Vulnerabilities in EAP��������
������ �7.2��� �Set of requirements for EAP����������
������ �7.3��� �Criteria for evaluating and classifying EAP methods
������ �7.4��� �EAP method����������
������ �7.5��� �Evaluation of existing EAP methods
8��� �Key management�
������ �8.1��� �Practical threats to a specific wireless access network���������
������ �8.2��� �General operational phases for key management�����
������ �8.3��� �Set of requirements for key management����
������ �8.4��� �General flow of key management protocol��
������ �8.5��� �Requirements classification of key management�������
9��� �Cryptographic key for key management���
������ �9.1��� �General policy model���������
������ �9.2��� �Possible cryptographic key hierarchy and key derivation�����
Appendix I � Evaluation of existing EAP methods��� �
Appendix II AAA protocol��� �
Bibliography��� �