The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

the Extensible Authentication Protocol (EAP) is a generic ramework supporting multiple types of authentication ethods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another uthenticator. The EAP reauthentication Protocol provides a onsistent, ethodindependent and low-latency -authentication. It is extension to current EAP mechanism to upport intradomain handoff authentication. This paper nalyzed the performance of the EAP re-authentication rotocol, and compared it with that of the EAP-TLS protocol. he result shows that the authentication delay of EAP eauthentication protocol is only twentieth of that in the EAPTLS protocol.

Authors and Affiliations

Seema Mehla , Bhawna Gupta

Keywords

Related Articles

An Expert System to Suspect Chronic Kidney Disease

Chronic Kidney Disease is one of the major health problems throughout the world. Every year large number of people loses their lives because of this disease. According to statistics, many of these patients die of Chronic...

Resolving Ambiguous Entity through Context Knowledge and Fuzzy Approach

Entity extraction is considered as a fundamental step in many text mining applications such as machine translation, text summarization and text categorization. However, the major challenging issue in extracting the entit...

Energy Efficient Routing In MANET Using OLSR

Energy-efficient MANET routing protocol OSLR is widely used for routing in ad hoc networks. Residual energy of nodes play a vital role in route discovery in MANET. To support energy-efficient routing, accurate state info...

Image Segmentation using Extended Edge Operator for Mammographic Images

Detection of edges in an image is a very important step owards understanding image features. Since edges often occur at mage locations representing object boundaries, edge etection is extensively used in image segmenta...

Word Disambiguation in Web Search

Internet is huge like a sea as the amount of information is growing rapidly on WEB. Whenever user searches something on Internet the Search Engine provides an incredible amount of information that increases the complexit...

Download PDF file
  • EP ID EP119016
  • DOI -
  • Views 250
  • Downloads 0

How To Cite

Seema Mehla, Bhawna Gupta (2010). The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol. International Journal on Computer Science and Engineering, 2(3), 669-673. https://www.europub.co.uk/articles/-A-119016