ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

The Internet Engineering Task Force (IETF) has prop osed new protocols for highly secured wireless networkin g. The purpose of this paper is to implement one such prop osed security protocol PEAP (Protected Extensible Authentication Protocol) [1]. PEAP was jointly deve loped by Microsoft, Cisco and RSA security. The protocol implementation is done on the server end of a Clien t/S rver network model on a RADIUS server (Remote Authentication Dial-in User Service). The proposed protocol PEAP provides for Client identity protec tion and key generation thus preventing unauthorized user ac cess and protecting or encrypting the data against malic ious activities.