2nd International ICST Conference on Security and Privacy in Comunication Networks

Research Article

Implementation and Performance Evaluation of EAP-TLS-KS

  • @INPROCEEDINGS{10.1109/SECCOMW.2006.359535,
        author={Jared Cordasco and Ulrike Meyer  and Susanne  Wetzel},
        title={Implementation and Performance Evaluation of EAP-TLS-KS},
        proceedings={2nd International ICST Conference on Security and Privacy in Comunication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2007},
        month={5},
        keywords={},
        doi={10.1109/SECCOMW.2006.359535}
    }
    
  • Jared Cordasco
    Ulrike Meyer
    Susanne Wetzel
    Year: 2007
    Implementation and Performance Evaluation of EAP-TLS-KS
    SECURECOMM
    IEEE
    DOI: 10.1109/SECCOMW.2006.359535
Jared Cordasco1,*, Ulrike Meyer 1,*, Susanne Wetzel1,*
  • 1: Stevens Institute of Technology, Hoboken, New Jersey.
*Contact email: jcordasc@cs.stevens.edu, umeyer@cs.stevens.edu, swetzel@cs.stevens.edu

Abstract

In this paper we analyze the performance of authentication protocols for roaming in 802.11i-protected WLANs. In particular, we compare the recently introduced EAP-TLS-KS protocol to standard configurations in EAP-TLS. Roaming configurations for EAP-TLS are such that all traffic is forwarded to the home network leaving the foreign network no control over the authentication. Alternatively, the foreign network handles authentication on its own, and the home network relinquishes control. In contrast, EAP-TLS-KS involves both networks and gives each of them control over the authentication. In addition to performance evaluations, we discuss how to implement EAP-TLS-KS, what difficulties one may encounter, and how they can be solved