The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

the Extensible Authentication Protocol (EAP) is a generic ramework supporting multiple types of authentication ethods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another uthenticator. The EAP reauthentication Protocol provides a onsistent, ethodindependent and low-latency -authentication. It is extension to current EAP mechanism to upport intradomain handoff authentication. This paper nalyzed the performance of the EAP re-authentication rotocol, and compared it with that of the EAP-TLS protocol. he result shows that the authentication delay of EAP eauthentication protocol is only twentieth of that in the EAPTLS protocol.

Authors and Affiliations

Seema Mehla , Bhawna Gupta

Keywords

Related Articles

Invariant Moments based War Scene Classification using ANN and SVM: A Comparative Study

In this paper we are trying to classify a war scene from the natural scene. For this purpose two set of image categories are taken viz., opencountry & war tank. By using Invariant Moments features are extracted from...

Enhanced Bee Colony Algorithm for Complex Optimization Problems

Optimization problems are considered to be one kind of NP hard problems. Usually heuristic approaches are found to provide solutions for NP hard problems. There are a plenty of heuristic algorithms available to solve opt...

Mathematical algorithms for determination of mixed layer height from laser radar signals

This paper describes different mathematical algorithms used in the determination of mixed layer height (MLH) from the laser radar (lidar) signals. These methods are successfully applied to the indigenously developed port...

Novel Pattern Matching Algorithm for Single Pattern Matching

Pattern matching is one of the important issues in the areas of network security and many others. The increase in network speed and traffic may cause the existing algorithms to become a performance bottleneck. Therefore,...

REVIEW of SOME MINIMUM-PROCESS SYNCHRONOUS CHECKPOINTING SCHEMES for MOBILE DISTRIBUTED SYSTEMS

The term Distributed Systems is used to describe a system with the following characteristics: i) it consists of several computers that do not share memory or a clock, ii) the computers ommunicate with each other by exch...

Download PDF file
  • EP ID EP119016
  • DOI -
  • Views 241
  • Downloads 0

How To Cite

Seema Mehla, Bhawna Gupta (2010). The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol. International Journal on Computer Science and Engineering, 2(3), 669-673. https://europub.co.uk/articles/-A-119016