DocumentCode :
2574518
Title :
Implementation and Performance Evaluation of EAP-TLS-KS
Author :
Cordasco, Jared ; Meyer, Ulrike ; Wetzel, Susanne
Author_Institution :
Stevens Inst. of Technol., Hoboken, NJ
fYear :
2006
fDate :
Aug. 28 2006-Sept. 1 2006
Firstpage :
1
Lastpage :
12
Abstract :
In this paper we analyze the performance of authentication protocols for roaming in 802.11i-protected WLANs. In particular, we compare the recently introduced EAP-TLS-KS protocol to standard configurations in EAP-TLS. Roaming configurations for EAP-TLS are such that all traffic is forwarded to the home network leaving the foreign network no control over the authentication. Alternatively, the foreign network handles authentication on its own, and the home network relinquishes control. In contrast, EAP-TLS-KS involves both networks and gives each of them control over the authentication. In addition to performance evaluations, we discuss how to implement EAP-TLS-KS, what difficulties one may encounter, and how they can be solved
Keywords :
protocols; telecommunication traffic; wireless LAN; 802.11i-protected WLANs; EAP-TLS-KS protocol; authentication protocols; roaming configurations; Authentication; Communication system traffic control; Home automation; Network servers; Performance analysis; Protocols; Public key; Roaming; Testing; Wireless LAN;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Securecomm and Workshops, 2006
Conference_Location :
Baltimore, MD
Print_ISBN :
1-4244-0423-1
Electronic_ISBN :
1-4244-0423-1
Type :
conf
DOI :
10.1109/SECCOMW.2006.359535
Filename :
4198795
Link To Document :
بازگشت