Analysis and Implementation of the Authentication Protocol 802. 1x

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 87 - Number 4
Year of Publication: 2014
A. I. A. Jabbar
Harith G. A.

A I A Jabbar and Harith G A.. Article: Analysis and Implementation of the Authentication Protocol 802.1x. International Journal of Computer Applications 87(4):40-46, February 2014. Full text available. BibTeX

	author = {A. I. A. Jabbar and Harith G. A.},
	title = {Article: Analysis and Implementation of the Authentication Protocol 802.1x},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {87},
	number = {4},
	pages = {40-46},
	month = {February},
	note = {Full text available}


The security of wireless networks against hacker attacks depends on some parameters and special configurations. Authentication is considered as one of the most important security parameter in computer networks [1]. The communication for example between users through the internet must be authenticated by both sides in order to prevent hackers from pretending any one of them [2]. Authentication process has the function to allow or prevent users from accessing the wireless network like IEEE 802. 11b or 802. 11g, it can be applied also to wired networks [3]. IEEE 802. 1X [4] is the famous standard which uses Extensible Authentication Protocol (EAP) to authenticate users before giving them access to the network [5]. The process of authentication is extended to include RADIUS protocol which is designed to authenticate remote users within special organizations, then upgraded to include most of the operating systems and computer networks. It is now the most famous and applicable protocol for authenticating remote users [6]. Recently, the operating system Android has dominated other operating systems, it is based on Linux core and has the capability to support 802. 1x and other security protocols [7]. In this paper, 802. 1x protocol is applied to authenticate users using windows 7 and Android operating systems, a comparison to show the main differences between them is introduced successfully in mixed (computer & mobiles) network.


  • YongYu, Qun Wang, Van Jiang, "Research on Security of the WLAN Campus Network" International Conference on E-Health Networking, Digital Ecosystems and Technologies, 2010.
  • M. Hasbullah Mazlan, Sharifah H. S. Ariffin, Mohammed Balfaqih, S. Norhaizum M. Hasnan, Shariq Haseeb, "Latency evaluation ofauthentication protocols incentralized 802. 11 architecture", Universiti Teknologi Malaysia (UTM), 2012.
  • Snehasish Parhi, "Attacks Due to Flaw of Protocols Used In Network Access Control (NAC) ", Their Solutions and Issues: A Survey, I. J. Computer Network and Information Security, 2012.
  • IEEE Standards, "IEEE Standard for Local and Metropolitan Area Networks - Port-Based Network Access Control", 2010.
  • Alexandra Chiornita, Laura Gheorghe, Daniel Rosner, "A Practical Analysis of EAP Authentication Methods, Faculty of Automatic Control and Computers", IEEE International Conference ,2010.
  • Ling-Wei Zhou, Sheng-ju Sang, "Analysis and Improvements of PEAP Protocol in WLAN", International Symposium on Information Technology in Medicine and Education, 2012.
  • Hadeel Tariq Al-Rayes, "Studying Main Differences between Android & Linux Operating Systems", International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:12 No:05, 2012.
  • Øystein Gyland, Tom Myren, Rune Sydskjør, Gunnar Bøe,"Implementation of IEEE 802. 1X in Wired Networks", UNINETT led working group on security (UFS 133), 2013.
  • Dirk van der Walt, "FreeRADIUS Beginner's Guide Manage your network resources with FreeRADIUS", PACKT publishing, BIRMINGHAM – MUMBAI, 2011.
  • Liran Tal of Enginx, "Virtual Machine daloRADIUS Administrator Guide Version 0. 9-9", 2011.