Performance Analysis of Signaling Cost on EAP-TLS Authentication Protocol based on Cryptography

نویسنده

  • S. Malarkan Dr. C. Ramesh
چکیده

With the wide applications of wireless communication in the air inter-face, needs secure connections, efficient decryption and strong authentication mechanisms. In general,authentication procedure adds extra messages to the original message flow and results in throughput reduction/ increase in processing time. Reducing the processing time spent on authentication procedure is very important for a smooth and seamless hand over. However there is a cost ,while deploying security on a network in terms of processing time. Extensible Authentication Protocol –Transport Layer Security (EAP-TLS) is a robust authentication mechanism used in beyond 3G (B3G) environments and it is seconded by Public Key Infrastructure (PKI).EAP-TLS authentication protocol supports a large number of cipher suites. By using Advanced Encryption Algorithm (AES) and Diffie Hellman -RSA key exchanges, a secure communication were established in B3G networks. This paper formally analyzes EAP-TLS message flow with cryptography algorithms and also numerical results are evaluated with the signaling cost. In addition to that PKI based solution has been discussed against Extensible Authentication Protocol –Authentication key Algorithm (EAP-AKA) procedures. The proof result shows that the authentication process of EAP-TLS can guarantee the security of wireless communication

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of Signaling Cost on Eap-Tls Authentication Protocol Based on Cryptography

With the wide applications of wireless communication in the air interface , needs secure connections, efficient decryption and strong authentication mechanisms. In

متن کامل

Selecting a Standard Outer Method for EAP

This paper outlines the problems in currently available authentication methods, such as EAP-TTLS, EAP-PEAP and EAP-FAST, and describes the desirable properties of a standard outer method. We examine the interaction between inner and outer methods and the types of issues that presently exist. We propose a new authentication method, EAP-PSK [PSK] with tunneling support (EAP-TLS-PSK), as an EAP pr...

متن کامل

Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN)

Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...

متن کامل

PPP and WLAN May

Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...

متن کامل

Comparative Analysis of IEEE 802.1x Authentication Methods

The IEEE Standard 802.11 is one of the most widely adopted mechanisms for WLANs, it provides comprehensive guidelines for their operational smoothness. 802.11 suffered from limited data confidentiality and cumbersome procedure for exchange of security parameters. In response to the security limitations in 802.11, IEEE introduced 802.1x for authentication and key management. The 802.1x is a port...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011