Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Evaluation of EAP Authentication Methods in Wired and Wireless Networks
Blekinge Institute of Technology, School of Computing.
Blekinge Institute of Technology, School of Computing.
2012 (English)Independent thesis Advanced level (degree of Master (Two Years))Student thesisAlternative title
Utvärdering av EAP-autentisering Metoder i Fasta och Trådlösa Nätverk (Swedish)
Abstract [en]

In any networking environment, security, connection time and scalability of the network are the major concerns to keep network safe, faster and stable. Administrators working within the networking environment need to have complete account of manageability, scalability and security of the network, so that the organizational data can be kept confidential and maintain integrity. There are different authentication methods used by network administrators for accessing network in wired and wireless environments. As network usage and attacks on network increases, a secure, scalable and standard network protocol is needed for accessing and to keep data safe in both wired and wireless networks. IEEE 802.1x is an IEEE standard used to provide authentication and authorization to the devices over LAN/WLAN. The framework IEEE 802.1x uses EAP for authentication and authorization with a RADIUS server. In this report, an experimental analysis for different EAP authentication methods in both wired and wireless networks in terms of authentication time and the total processing time is presented. Wireshark is used to capture the network traffic on server and client ends. After analyzing each packet timestamps that are captured using Wireshark, it is seen that EAP-MD5 takes less time in both wired and wireless networks, if the number of users increases, there is not much difference in the network connection time. Concerning with security of the network, EAP-MD5 is vulnerable to many attacks so it is not used by many companies. The alternative methods with their strengths and weaknesses are discussed.

Place, publisher, year, edition, pages
2012. , p. 64
Keywords [en]
Authentication, EAP Methods, IEEE 802.1x, RADIUS
National Category
Computer Sciences Telecommunications
Identifiers
URN: urn:nbn:se:bth-4240Local ID: oai:bth.se:arkivexE4139B4E30415B43C1257ABF00548B03OAI: oai:DiVA.org:bth-4240DiVA, id: diva2:831569
Uppsok
Technology
Supervisors
Available from: 2015-04-22 Created: 2012-11-23 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

fulltext(1615 kB)6431 downloads
File information
File name FULLTEXT01.pdfFile size 1615 kBChecksum SHA-512
caa48eca52118713bf4319319c6557b50c908bf9eb5e57a6958b4ce75cb006692e820219faefc86ffa6d876c6f0920f0319f0a1d679a8f3086d8e5f1716bd572
Type fulltextMimetype application/pdf

By organisation
School of Computing
Computer SciencesTelecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 6431 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 688 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf