Implementation and performance evaluation of EAP-TLS-KS

Jared Cordasco, Ulrike Meyer, Susanne Wetzel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In this paper we analyze the performance of authentication protocols for roaming in 802.11i-protected WLANs. In particular, we compare the recently introduced EAP-TLS-KS protocol to standard configurations in EAP-TLS. Roaming configurations for EAP-TLS are such that all traffic is forwarded to the home network leaving the foreign network no control over the authentication. Alternatively, the foreign network handles authentication on its own, and the home network relinquishes control. In contrast, EAP-TLS-KS involves both networks and gives each of them control over the authentication. In addition to performance evaluations, we discuss how to implement EAP-TLS-KS, what difficulties one may encounter, and how they can be solved.

Original languageEnglish
Title of host publication2006 Securecomm and Workshops
DOIs
StatePublished - 2006
Event2006 Securecomm and Workshops - Baltimore, MD, United States
Duration: 28 Aug 20061 Sep 2006

Publication series

Name2006 Securecomm and Workshops

Conference

Conference2006 Securecomm and Workshops
Country/TerritoryUnited States
CityBaltimore, MD
Period28/08/061/09/06

Fingerprint

Dive into the research topics of 'Implementation and performance evaluation of EAP-TLS-KS'. Together they form a unique fingerprint.

Cite this