Evaluation of EAP-methods
Network administrators typically employ di erent methods for authenticating and authorizing the access to their networks. A exible and scalable network access method is needed to combat the ever increasing network ubiquity brought on by technological advancements. The IEEE 802.1x Port-Based Network...
Main Authors: | , |
---|---|
Format: | Others |
Language: | English |
Published: |
Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation
2010
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4452 |
id |
ndltd-UPSALLA1-oai-DiVA.org-bth-4452 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-bth-44522018-01-12T05:13:58ZEvaluation of EAP-methodsengUtvärdering av EAP-metodeLorentzen, PeterLindh, JohanBlekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikationBlekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation2010802.1xauthenticationEAP-methodsRADIUSnetworkComputer SciencesDatavetenskap (datalogi)TelecommunicationsTelekommunikationNetwork administrators typically employ di erent methods for authenticating and authorizing the access to their networks. A exible and scalable network access method is needed to combat the ever increasing network ubiquity brought on by technological advancements. The IEEE 802.1x Port-Based Network Access is a technology that allows transparent authentication to a network. It uses EAP-methods in order to authenticate against a server. There are a lot of di erent EAP-methods to choose from, and they vary in complexity and security. This report will bring up the di erences between the most commonly used authentication methods regarding the authentication time depending on di erent delay and network load. Results showed that EAP-methods that are less complex take less time to perform authentication than their counterparts. When there is no delay, or a very small delay, this might not matter, but when the delay is higher complex EAP-methods take signi cantly longer time to perform the authentication process. This is very negative considering the nature of transparent authentication, and could lead to users becoming annoyed. A general formula for determining how long time an EAP-authentication process will take is presented. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:bth-4452Local oai:bth.se:arkivex5619FC33D97C269EC125780E003D953Aapplication/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
802.1x authentication EAP-methods RADIUS network Computer Sciences Datavetenskap (datalogi) Telecommunications Telekommunikation |
spellingShingle |
802.1x authentication EAP-methods RADIUS network Computer Sciences Datavetenskap (datalogi) Telecommunications Telekommunikation Lorentzen, Peter Lindh, Johan Evaluation of EAP-methods |
description |
Network administrators typically employ di erent methods for authenticating and authorizing the access to their networks. A exible and scalable network access method is needed to combat the ever increasing network ubiquity brought on by technological advancements. The IEEE 802.1x Port-Based Network Access is a technology that allows transparent authentication to a network. It uses EAP-methods in order to authenticate against a server. There are a lot of di erent EAP-methods to choose from, and they vary in complexity and security. This report will bring up the di erences between the most commonly used authentication methods regarding the authentication time depending on di erent delay and network load. Results showed that EAP-methods that are less complex take less time to perform authentication than their counterparts. When there is no delay, or a very small delay, this might not matter, but when the delay is higher complex EAP-methods take signi cantly longer time to perform the authentication process. This is very negative considering the nature of transparent authentication, and could lead to users becoming annoyed. A general formula for determining how long time an EAP-authentication process will take is presented. |
author |
Lorentzen, Peter Lindh, Johan |
author_facet |
Lorentzen, Peter Lindh, Johan |
author_sort |
Lorentzen, Peter |
title |
Evaluation of EAP-methods |
title_short |
Evaluation of EAP-methods |
title_full |
Evaluation of EAP-methods |
title_fullStr |
Evaluation of EAP-methods |
title_full_unstemmed |
Evaluation of EAP-methods |
title_sort |
evaluation of eap-methods |
publisher |
Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation |
publishDate |
2010 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4452 |
work_keys_str_mv |
AT lorentzenpeter evaluationofeapmethods AT lindhjohan evaluationofeapmethods AT lorentzenpeter utvarderingaveapmetode AT lindhjohan utvarderingaveapmetode |
_version_ |
1718606918421839872 |