The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

the Extensible Authentication Protocol (EAP) is a generic ramework supporting multiple types of authentication ethods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another uthenticator. The EAP reauthentication Protocol provides a onsistent, ethodindependent and low-latency -authentication. It is extension to current EAP mechanism to upport intradomain handoff authentication. This paper nalyzed the performance of the EAP re-authentication rotocol, and compared it with that of the EAP-TLS protocol. he result shows that the authentication delay of EAP eauthentication protocol is only twentieth of that in the EAPTLS protocol.

Authors and Affiliations

Seema Mehla , Bhawna Gupta

Keywords

Related Articles

Analysis of Maintainability Models for Object Oriented System

There is always has been a demand to provide efficient and effective high quality software. There are various maintainability objects to provide better maintainability. The quality of good software design heavily effecti...

Android in opposition to iPhone

The paper is an analysis and comparison of the android mobile OS with the iPhone which have ruled the mobile market in past years today is facing a downfall just because of the introduction of this new OS. Android with i...

Road Recognition for Vision Navigation of Robot by Using Computer Vision

This paper presents a method for vision navigation of robot by road recognition based on image processing. By taking advantages of the unique structure in road images, the square images on road can be scanned while the r...

Study and Constructing RDF model for a well formatted Valid XML document

In recent years semantic web is one of the technologies to make the WWW as machineunderstandable. The Resource Description Framework (RDF) proposed by W3C is used for describing metadata about (Web) resources. The RDF da...

FREQUENT DATA GENERATION USING RELATIVE DATA ANALYSIS

Traditional association rule mining method mines association rules only for the items bought by the customer. However an actual transaction consists of the items bought by the customer along with the quantity of items bo...

Download PDF file
  • EP ID EP119016
  • DOI -
  • Views 238
  • Downloads 0

How To Cite

Seema Mehla, Bhawna Gupta (2010). The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol. International Journal on Computer Science and Engineering, 2(3), 669-673. https://europub.co.uk./articles/-A-119016