EAP-SIM
What is Expansion of EAP-SIM?
EAP-SIM stands for Extensible Authentication Protocol – Subscriber Identity Module.
What is EAP-SIM?
EAP-SIM is an authentication method that uses credentials stored on a GSM SIM card to authenticate users to a network using the EAP framework. It enables integration between GSM networks and IP-based access networks like Wi-Fi.
Why is EAP-SIM useful?
Enables seamless authentication using existing SIM credentials.
Eliminates the need for passwords or digital certificates.
Ideal for public Wi-Fi offloading and carrier-grade wireless access.
Offers mutual authentication and key generation.
How it works?
The server sends a set of GSM triplets (RAND, AUTN).
The SIM card computes response (SRES) and encryption key (Kc).
Authentication is achieved by comparing server and client responses.
Session keys (MSK/EMSK) are derived after successful authentication.
Where is EAP-SIM used?
Public Wi-Fi hotspots with SIM-based login.
Carrier Wi-Fi offload systems.
3GPP I-WLAN environments.
Enterprise WLANs integrating GSM authentication.
Which OSI layer does this protocol belong to?
Application Layer (Layer 7) in the OSI model.
EAP messages are transported over lower-layer protocols like EAPOL or RADIUS.
IS EAP-SIM Windows specific?
No, EAP-SIM is not Windows-specific.
Support depends on the supplicant and device hardware (e.g., SIM reader).
IS EAP-SIM Linux Specific?
No, it is not Linux-specific.
Commonly supported in Linux via wpa_supplicant and FreeRADIUS.
Which Transport Protocol is used by EAP-SIM?
Backend protocols: * RADIUS (UDP) * Diameter (TCP/SCTP)
EAP-SIM itself rides over EAP which can be transported via EAPOL or PPP.
Which Port is used by EAP-SIM?
RADIUS (UDP): Port 1812 (Authentication)
Diameter (TCP/SCTP): Port 3868
Is EAP-SIM using Client server model?
Yes.
Client: Mobile device with SIM
Server: Authentication server (e.g., RADIUS) integrated with HLR/HSS
Whether EAP-SIM protocol uses certificates?
No.
It relies on GSM authentication using SIM triplets (RAND, SRES, Kc).
How many frame exchanges are seen during connection for EAP-SIM protocol?
Typically involves 5 to 7 EAP message exchanges, depending on the flow and optional notifications.
Whether EAP-SIM Protocol uses client certificates?
No, it uses the SIM card for authentication.
Whether EAP-SIM Protocol uses Server Certificates?
No, server authentication is handled through MAC-based mutual authentication using SIM secrets.
IS EAP-SIM Protocol depends on TCP?
Not directly.
If Diameter is used as the backend, TCP or SCTP may be involved.
IS EAP-SIM Protocol depends on UDP?
Yes, when RADIUS is used for backend communication, it depends on UDP.
What are the roles involved when testing EAP-SIM Protocol?
Supplicant (e.g., mobile device with SIM)
Authenticator (e.g., Access Point)
Authentication Server (e.g., FreeRADIUS)
SIM backend (e.g., HLR, HSS or GSM authentication simulator)
Does EAP-SIM Protocol work with free radius server on Linux?
Yes, FreeRADIUS supports EAP-SIM.
Configuration may require a GSM authentication plugin or proxy to HLR.
Does EAP-SIM Protocol work with Internal radius server of hostapd?
No, the internal RADIUS server in hostapd does not support EAP-SIM.
What is the RFC version use for EAP-SIM Protocol?
RFC 4186
During Connection Procedure which EPoL Packets are encrypted?
EAPOL packets are not encrypted at Layer 2.
Integrity is maintained through cryptographic MACs using session keys.
Can you Explain different stages of Connection Procedure for EAP-SIM Protocol?
Stage 1: EAP Identity exchange.
Stage 2: Server sends RAND challenges and identities.
Stage 3: SIM computes SRES/Kc and replies with responses and MAC.
Stage 4: Server validates responses using GSM triplets.
Stage 5: Both sides derive session keys (MSK, EMSK).
Stage 6: EAP Success message is sent.
What is the final output of Connection Procedure?
Generation of MSK (Master Session Key) and EMSK for secure communication.
What is the format of the key generate after the connection procedure?
MSK: 64 bytes (512 bits)
EMSK: 64 bytes (512 bits), optional usage.
Where the use of PMK generated by the Connection Procedure?
PMK is derived from MSK.
It is used in the 4-way WPA2 handshake to generate PTK for encrypting wireless data.
In this section, you are going to learn
Terminology
Version Info
rfc details
setup
packet details
usecases
features
Reference links