�1��� �Scope�
�2��� �References�
�3��� �Terms and definitions�������
������ �3.1��� �Terms from [IETF RFC
4017] and their definitions�
������ �3.2��� �Terms from [ITU-T
X.1151] and their definitions���
������ �3.3��� �Terms from [ISO/IEC 8802-11] and
their definitions����������
������ �3.4��� �Terms defined in this Recommendation�������
�4��� �Abbreviations and acronyms��������
�5��� �Conventions�����
�6��� �EAP-based authentication and
key management framework����������
������ �6.1��� �Introduction�����������
������ �6.2��� �General features of
EAP����
������ �6.3��� �Basic operational
procedures for authentication and key management protocols������
�7��� �EAP protocols��
������ �7.1��� �Vulnerabilities in EAP��������
������ �7.2��� �Set of requirements
for EAP����������
������ �7.3��� �Criteria for
evaluating and classifying EAP methods
������ �7.4��� �EAP method����������
������ �7.5��� �Evaluation of existing
EAP methods
�8��� �Key management�
������ �8.1��� �Practical threats to a
specific wireless access network���������
������ �8.2��� �General operational
phases for key management�����
������ �8.3��� �Set of requirements
for key management����
������ �8.4��� �General flow of key
management protocol��
������ �8.5��� �Requirements
classification of key management�������
�9��� �Cryptographic key for key management���
������ �9.1��� �General policy model���������
������ �9.2��� �Possible cryptographic
key hierarchy and key derivation�����
Appendix I � Evaluation of existing EAP methods��� �
Appendix II � AAA
protocol��� �
Bibliography��� �