Evaluation of EAP-methods

Network administrators typically employ di erent methods for authenticating and authorizing the access to their networks. A exible and scalable network access method is needed to combat the ever increasing network ubiquity brought on by technological advancements. The IEEE 802.1x Port-Based Network...

Full description

Bibliographic Details
Main Authors: Lorentzen, Peter, Lindh, Johan
Format: Others
Language:English
Published: Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation 2010
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4452
id ndltd-UPSALLA1-oai-DiVA.org-bth-4452
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-bth-44522018-01-12T05:13:58ZEvaluation of EAP-methodsengUtvärdering av EAP-metodeLorentzen, PeterLindh, JohanBlekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikationBlekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation2010802.1xauthenticationEAP-methodsRADIUSnetworkComputer SciencesDatavetenskap (datalogi)TelecommunicationsTelekommunikationNetwork administrators typically employ di erent methods for authenticating and authorizing the access to their networks. A exible and scalable network access method is needed to combat the ever increasing network ubiquity brought on by technological advancements. The IEEE 802.1x Port-Based Network Access is a technology that allows transparent authentication to a network. It uses EAP-methods in order to authenticate against a server. There are a lot of di erent EAP-methods to choose from, and they vary in complexity and security. This report will bring up the di erences between the most commonly used authentication methods regarding the authentication time depending on di erent delay and network load. Results showed that EAP-methods that are less complex take less time to perform authentication than their counterparts. When there is no delay, or a very small delay, this might not matter, but when the delay is higher complex EAP-methods take signi cantly longer time to perform the authentication process. This is very negative considering the nature of transparent authentication, and could lead to users becoming annoyed. A general formula for determining how long time an EAP-authentication process will take is presented. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:bth-4452Local oai:bth.se:arkivex5619FC33D97C269EC125780E003D953Aapplication/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic 802.1x
authentication
EAP-methods
RADIUS
network
Computer Sciences
Datavetenskap (datalogi)
Telecommunications
Telekommunikation
spellingShingle 802.1x
authentication
EAP-methods
RADIUS
network
Computer Sciences
Datavetenskap (datalogi)
Telecommunications
Telekommunikation
Lorentzen, Peter
Lindh, Johan
Evaluation of EAP-methods
description Network administrators typically employ di erent methods for authenticating and authorizing the access to their networks. A exible and scalable network access method is needed to combat the ever increasing network ubiquity brought on by technological advancements. The IEEE 802.1x Port-Based Network Access is a technology that allows transparent authentication to a network. It uses EAP-methods in order to authenticate against a server. There are a lot of di erent EAP-methods to choose from, and they vary in complexity and security. This report will bring up the di erences between the most commonly used authentication methods regarding the authentication time depending on di erent delay and network load. Results showed that EAP-methods that are less complex take less time to perform authentication than their counterparts. When there is no delay, or a very small delay, this might not matter, but when the delay is higher complex EAP-methods take signi cantly longer time to perform the authentication process. This is very negative considering the nature of transparent authentication, and could lead to users becoming annoyed. A general formula for determining how long time an EAP-authentication process will take is presented.
author Lorentzen, Peter
Lindh, Johan
author_facet Lorentzen, Peter
Lindh, Johan
author_sort Lorentzen, Peter
title Evaluation of EAP-methods
title_short Evaluation of EAP-methods
title_full Evaluation of EAP-methods
title_fullStr Evaluation of EAP-methods
title_full_unstemmed Evaluation of EAP-methods
title_sort evaluation of eap-methods
publisher Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation
publishDate 2010
url http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4452
work_keys_str_mv AT lorentzenpeter evaluationofeapmethods
AT lindhjohan evaluationofeapmethods
AT lorentzenpeter utvarderingaveapmetode
AT lindhjohan utvarderingaveapmetode
_version_ 1718606918421839872