ABSTRACT

Contents 16.1 Introduction ........................................................................................... 420

16.1.1 WMNs Architecture ................................................................. 420 16.1.2 Authentication in WMNs ......................................................... 422

16.2 Extensible Authentication Protocol .........................................................424 16.2.1 EAP Authentication Methods ................................................... 426 16.2.2 IEEE802.1X Standard ................................................................427 16.2.3 Protocol for Carrying Authentication for Network Access ..........427

16.3 IEEE802.11 Network Security ............................................................... 428 16.3.1 Robust Security Network Associations ...................................... 430 16.3.2 IEEE802.11 STA Authentication .............................................. 430 16.3.3 IEEE802.11 Handshakes ............................................................431

16.4 IEEE802.11s Network Security .............................................................. 434 16.4.1 IEEE802.11s Authentication Protocols .......................................436