Abstract:With the development of secure authentication technologies, network authentication has already become an important approach to protect network security. IEEE802.1x, the widely used authentication protocol, is based on the Extensible Authentication Protocol(EAP). EAP provides a lot of specific protocols, most of which have their own advantages and disadvantages. The disvantages include lacking protection of user name and mutual authentication and difficulty in deployment. This paper presents a new hash-based authen- tication protocol, which aims to avoid the above disadvantages of protocols. Authentication process and security analysis is explained in detail. Comparison with some protocols is also provided.