The Performance Analysis of Fast EAP Re-authentication Protocol

@article{Xu2008ThePA,
  title={The Performance Analysis of Fast EAP Re-authentication Protocol},
  author={Qing Xu and Changsheng Wan and Aiqun Hu},
  journal={2008 International Symposium on Computer Science and Computational Technology},
  year={2008},
  volume={1},
  pages={99-103}
}
With extensions to current EAP key hierarchy, the EAP re-authentication protocol provides a consistent, method-independent and low-latency re-authentication mechanism to support intra-domain handoff authentication. This paper analyzed the efficiency of the EAP re-authentication protocol, and compared it with that of the EAP-TLS protocol. The result shows that the authentication delay of EAP re-authentication protocol is only twentieth of that in the EAP-TLS protocol. 

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 13 references

Derivation, delivery and management of EAP based keys for handover and re-authentication

  • M. Nakhjiri, Y. Ohba
  • IETF draft-ietf-hokey-key-mgm-03,
  • 2008

Aboba, Guidance for AAA Key Management, RFC 4962

  • B. R. Housley
  • 2007

Diameter Support for EAP Re-authentication Protocol "IETF draft-dondeti-dime-erp-diameter-01

  • V. Narayanan, L. Dondeti
  • November 19,
  • 2007
1 Excerpt

draft-ietf-hokey-reauth-ps-02, "Handover Key Management and Re-authentication Problem Statement

  • T. Clancy
  • July 24,
  • 2007

Beadles, Network Access Identifier (NAI)

  • M. B. Aboba
  • IETF RFC
  • 2005

Similar Papers

Loading similar papers…