Implementation of Extensible Autentication Protocol in OPNET Modeler
Implementation of Extensible Autentication Protocol in OPNET Modeler
Abstract—As wireless technology is becoming more and the model we are implementing. Validation of this work
more prevalent; security in such networks is becoming a is presented in section 5. Finally in section 6 the
challenging issue and is in great demand. One of the most
powerful tools in this area which helps to simulate and conclusion and future work is provided.
evaluate the behaviour of networks and protocols is
OPtimised Network Engineering Tool (OPNET). Although II. EAP
OPNET has covered a wide range of models and a variety of
protocols, there is no implementation of security in it. In this In this section we only focus on details which we
paper we implement and simulate Extensible Authentication utilized to implement EAP. For further information refer
Protocol (EAP) using discrete event simulator OPNET to [3]. EAP is an authentication framework which
modeller. EAP is an authentication framework which is
compatible with IEEE 802.1x the security framework for supports multiple authentication methods. EAP typically
IEEE 802 family. runs directly over data link layers such as Point-to-Point
Protocol (PPP) or IEEE 802, without requiring IP.
Keywords-WLAN; Security; Authentication; EAP; OPNET; A. Terminology
Simulation;
There are different terminologies due to different
I. INTRODUCTION standards, in this paper we refer to RFC 3748.
Widespread acceptance and implementation of Authenticator: The end of the link initiating EAP
wireless local area networks (WLANs) have also brought authentication. The term authenticator is used in IEEE
concerns about the security of these networks. 802.1X and has the same meaning in this paper.
Transmitting data via an air interface rather than a more Peer: The end of the link that responds to the
secure physical conduit brings along with it certain authenticator. In IEEE 802.1X, this end is known as the
inherent vulnerabilities to security [1]. Supplicant. In this paper this end of the link is called the
Since IEEE introduced WEP [2] for the security of peer.
IEEE 802.11 [2], up to the latest release of 802.1X [3] in Backend Authentication Server: A backend
2010, a multitude of methods and protocols have been authentication server is an entity that provides an
proposed [4, 5, 6, 7]. But none of them achieved the authentication service to an authenticator. When used,
success and acceptability of EAP [8]. EAP is commonly this server typically executes EAP methods for the
used for authentication in port-based access control, and authenticator. This terminology is also used in IEEE
originally developed for point-to-point protocol (PPP) [9] 802.1X.
connections. We give a brief overview of EAP in the next B. EAP Authentication Exchange Process
section. Step1. The authenticator sends a Request to
OPNET [10, 11] as a powerful simulation tool is authenticate the peer. The Request has a Type field to
applied to implement EAP and evaluate and measure indicate what is being requested.
parameters such as delay and overhead in a wireless test Step2. The peer sends a Response packet in reply to a
bed, as there is no evidence of consideration of security in valid Request. As with the Request packet, the Response
it. With this measurement we can define how wireless packet contains a Type field, which corresponds to the
networks can be affected by security consideration. Type field of the Request.
The rest of the paper is organized as follow. In next Step3. The authenticator sends an additional Request
section we briefly discus EAP. In section 3 we present packet, and the peer replies with a Response. The
modular concept of OPNET. Section 4 gives details about
sequence of Requests and Responses continues as long as includes a class of methods based on public key
needed. infrastructure [12] and the use of certificates as well as a
Step4. The conversation continues until the class of methods that do not use certificates but
authenticator cannot authenticate the peer, in which case passwords for their authentication. A comparative study
the authenticator transmits an EAP Failure (Code 4). of these methods can be found in [13].
Alternatively, the authentication conversation can In this paper EAP-MD5 [14] have been implemented
continue until the authenticator determines that successful and analysed which is based on challenge-response
authentication has occurred, in which case the mechanism and due to [15] is one of the most implanting
authenticator transmits an EAP Success (Code 3). Fig. 1 protocols in authentication mechanisms. The packet
demonstrates the packet exchange between different format of EAP-MD5 due to RFC 1994 consists of four
entities. Note that in this paper authenticator and server simple fields and is depicted in Fig. 3. Note that this
merged into one node. packet is encapsulated in data field of EAP packet.
C. Encapsulation
III. OPNET
The encapsulation of EAP over IEEE 802 is defined in
IEEE 802.1X and known as EAP over LANs or EAPOL. OPNET is a vast software package with an extensive
EAPOL was originally designed for IEEE 802.3 Ethernet set of features designed to support general network
in 802.1X-2001, but was clarified to suit other IEEE 802 modeling and to provide specific support for particular
LAN technologies such as IEEE 802.11 wireless LANs. types of network simulation projects. OPNET provides a
Encapsulation of EAP over different protocols is flexible, high-level programming language with extensive
illustrated in Fig. 2. support for communications and distributed systems. This
environment allows realistic modeling of all
communications protocols, algorithms, and transmission
technologies. OPNET supports model specification with
a number of tools or editors that capture the
characteristics of a modeled system’s behavior. Because
it is based on a suite of editors that address different
aspects of a model, OPNET is able to offer specific
capabilities to address the diverse issues encountered in
networks and distributed systems.
A. Hierarchical Architecture
To present the model developer with an intuitive
interface, the editors break down the required modeling
information in a manner that parallels the structure of
actual network systems. Thus, the model-specification
editors are organized in an essentially hierarchical
fashion. Model specifications performed in the Project
Figure 2. EAP encapsulation over different LAN technologies Editor rely on elements specified in the Node Editor; in
turn, when working in the Node Editor, the developer
As it is seen, several methods of EAP are available makes use of models defined in the Process Editor. The
and encapsulate in EAP Data field. Some have been remaining editors are used to define various data models;
developed specifically for wireless networks in addition packet format editor, link model editor, etc.
to EAP methods existing for wired networks. This The Network, Node, and Process modeling
environments are sometimes referred to as the modeling
domains of OPNET. The issues addressed by each IV. IMPLEMENTING EAP
domain are summarized in TABLE I.
OPNET’s Process Editor expresses process models in Our scenario consists of two nodes in project domain
a language called Proto-C, which is specifically designed as illustrated in Fig. 4; an access point and a client.
to support development of protocols and algorithms. The access point (AP) plays the role of Authenticator
Proto-C is based on a combination of state transition as well as Backend Authentication Server simultaneously,
diagrams (STDs), a library of high-level commands as it is defined in EAP terminology, while client
known as Kernel Procedures, and the general facilities of corresponds to peer.
the C or C++ programming language. A. Project Model
TABLE I: OPNET Modeling Domains In Fig. 4, project domain and the nodes insides are
presented.
OPNET Modeling Domains
Domain Editor Modeling Focus
D. Process Model
V. VALIDATION