References

3rd Generation Partnership Project (3GPP) Technical Specification Group Service and System Aspects, 3G       Security, Wireless Local Area Network (WLAN) internetworking security (Release 7). 2006. 3GPP TS       33.234.
Aboba, B. & Simon, D. 1999. RFC 2716, PPP EAP TLS Authentication Protocol. The Internet Society.
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J. & Levkowetz, H. (Ed.) 2004. RFC 3748, Extensible       Authentication Protocol (EAP). The Internet Society.
Agni, M., Abdullah, Azween & Low Tan Jung. 2008. Simulation of EAP Method Selection and Negotiation       Mechanism. Proceedings of the 3rd International Symposium on Information Technology (ITSIM), 26-29       August. Kuala Lumpur, Malaysia.
Agray, N., Wiebe van der Hoek & Erik de Vink. 2002. On BAN Logic for Industrial Security Protocols.       Proceeding of the 2nd International Workshop of Central and Eastern Europe on Multi-Agent Systems       (CEEMAS). Berlin, Heidelberg: Springer- Verlag.
Ali, K. M. & Owens, T. J. 2007. Selection of an EAP Authentication Method for a WLAN. Int. J. Information and       Computer Security, 1(1/2): pp. 210-233.
Anderson, R. J. 1997. The Formal Verification of a Payment System. Cambridge, UK: Computer Laboratory.
Arkko, J. & Haverinen, H. 2006. RFC 4187, Extensible Authentication Protocol Method for 3rd Generation       Authentication and Key Agreement (EAP-AKA). The Internet Society.
Burrows, M., Abadi, M. & Needham, R. 1990. A Logic of Authentication. ACM Transaction on Computer Systems,       8(1): 18-36
Chiu-Man, Yu. 2002. Secure Execution of Mobile Agents on Open Networks using Cooperative Agents. Master Thesis,       the Chinese University of Hongkong.
Dierks, T. & Allen, C. 1999. RFC 2246, The TLS Protocol Version 1.0. The Internet Society.
Forsberg, D., Ohba, Y. (Ed.), Patil, B., Tschofenig, H. & Yegin, A. 2007. Protocol for Carrying Authentication       for Network Access (PANA). Internet-Draft. The IETF Trust.
Funk, P. & Blake-Wilson, S. 2007. EAP Tunneled TLS Authentication Protocol Version 0 (EAP-TTLSv0). Internet-Draft.       The Internet Trust.
Haverinen, H. (Ed.) & Saloway, J., Ed. 2006. RFC 4186, Extensible Authentication Protocol Method for Global System       for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM). The Internet Society.
Horrigan, J. 2007. Wireless Internet Access, December 2006 Tracking Survey. Princeton Survey Research Associates       International for Pew Internet & American Life Project.
IEEE Standard for Information technology – Telecommunications and information exchange between systems – Local       and metropolitan area networks – Specific requirements, Part 11, Amendment 6: Medium Access Control (MAC)       Security Enhancements. 2004. IEEE Standard 802.11i.
IEEE Standard for Local and metropolitan area networks, Part 16, Amendment 2: Physical and Medium Access Control       Layers for Combined Fixed and Mobile Operations in Licensed Bands. 2006. IEEE Standard 802.16e.
IEEE Standard for Local and metropolitan area networks, Port-Based Network Access Control, 2004. IEEE Standard       802.1X.
Kamath, V., Palekar, A. & Wodrich, M. 2002. Microsoft’s PEAP version 0 (Implementation in Windows XP SP1).       Internet-Draft. The Internet Society.
Khan, K. and Akbar, M. 2006. Authentication in Multi-Hop Wireless Mesh Networks. Transactions on Engineering,       Computing and Technology, Vol. 16, November. World Enformatika Society.
Lee, Jong-Hoon & Park, Ho Jin. 2003. A User Authentication Protocol Using EAP for Mobile Ad Hoc Networks.       Proceedings of the IASTED International Conference: Communication, Network, and Information Security. New       York, USA.
Lou, W. & Fang, Y. 2004. A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available       Solutions. In Ad Hoc Wireless Networking, Network Theory and Applications, Vol. 14. Kluwer Academic Publishers.
Microsoft Corp. 2007. IEEE 802.11 Wireless LAN Security with Microsoft Windows, January. (online).       http://www.microsoft.com/downloads/
Moustafa, H., Bourdon, G. & Gourhant, Y. 2005. AAA in Vehicular Communication on Highways with Ad hoc Networking       Support: A Proposed Architecture. Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc       Networks (VANET 2005). Cologne, Germany.
Nidjam, M. & Scholten, H. 2006. Access Point Security Service for wireless ad-hoc communication. Technical Report       TR-CTIT-06-66 Centre for Telematics and Information Technology. Enschede, Netherlands: University of Twente.
Palekar, A., Simon, D., Salowey, J., Zhou, H., Zorn, G. & Josefsson, S. 2004. Protected EAP Protocol (PEAP) Version 2.       Internet-Draft, The Internet Society.
Paulson, L.C. 1998. Inductive Analysis of the Internet Protocol TLS. Security Protocols.Berlin, Heidelberg:       Springer-Verlag.
Sankar, K., Sundaralingam, S., Miller, D. & Balinsky, A. 2005. Cisco Wireless LAN Security. N.York: Cisco Press.