Latency evaluation of authentication protocols in centralized 802.11 architecture
Latency evaluation of authentication protocols in centralized 802.11 architecture
- Author(s): M.H. Mazlan ; S.H.S. Ariffin ; M. Balfaqih ; S.N.M. Hasnan ; S. Haseeb
- DOI: 10.1049/cp.2012.2113
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
IET International Conference on Wireless Communications and Applications (ICWCA 2012) — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): M.H. Mazlan ; S.H.S. Ariffin ; M. Balfaqih ; S.N.M. Hasnan ; S. Haseeb Source: IET International Conference on Wireless Communications and Applications (ICWCA 2012), 2012 page ()
- Conference: IET International Conference on Wireless Communications and Applications (ICWCA 2012)
- DOI: 10.1049/cp.2012.2113
- ISBN: 978-1-84919-550-8
- Location: Kuala Lumpur, Malaysia
- Conference date: 8-10 Oct. 2012
- Format: PDF
With the growing of telecommunication technology, people can connect to the Internet wirelessly anywhere and anytime. IEEE 802.11 Wireless Local Area Network (WLAN) became the preferred technology for providing Internet access in both indoors and outdoors environments for private and public usage. In order to establish the connection, users need to authenticate and associate with the Access Point (AP) to get access to the network. This was originally not a secured environment. For securing authentication process, many protocols had been introduced to protect the WLANs against unauthorized access from attackers. This paper aims to evaluate the performance of different authentication protocols in Centralized 802.11 Architecture by comparing the latency for Authentication and Association, 802.1x Authentication and Key Management phases. Experiments were performed on a centralized WLAN testbed consisting of Access Controller (AC), AP, RADIUS server and Client in neighbourhood AP environment. We analyse the authentication protocols in error free and error prone scenarios to study the effect of error during re-authentication process during handover. WPA2-Enterprise authentication methods cause the highest re-authentication latency compare with open-system authentication and WPA2-Personal authentication. In the re-authentication component for WPA2Enterprise, 802.1x authentication phase cause highest latency than authentication and association phase and key management phase. (6 pages)
Inspec keywords: Internet; cryptographic protocols; wireless LAN
Subjects: Radio links and equipment; Data security; Cryptography; Computer communications; Local area networks; Protocols
Related content
content/conferences/10.1049/cp.2012.2113
pub_keyword,iet_inspecKeyword,pub_concept
6
6