Change search
ReferencesLink to record
Permanent link

Direct link
Evaluation of EAP-methods
Blekinge Institute of Technology, School of Computing.
Blekinge Institute of Technology, School of Computing.
2010 (English)Independent thesis Advanced level (degree of Master (One Year))Student thesisAlternative title
Utvärdering av EAP-metode (Swedish)
Abstract [en]

Network administrators typically employ di erent methods for authenticating and authorizing the access to their networks. A exible and scalable network access method is needed to combat the ever increasing network ubiquity brought on by technological advancements. The IEEE 802.1x Port-Based Network Access is a technology that allows transparent authentication to a network. It uses EAP-methods in order to authenticate against a server. There are a lot of di erent EAP-methods to choose from, and they vary in complexity and security. This report will bring up the di erences between the most commonly used authentication methods regarding the authentication time depending on di erent delay and network load. Results showed that EAP-methods that are less complex take less time to perform authentication than their counterparts. When there is no delay, or a very small delay, this might not matter, but when the delay is higher complex EAP-methods take signi cantly longer time to perform the authentication process. This is very negative considering the nature of transparent authentication, and could lead to users becoming annoyed. A general formula for determining how long time an EAP-authentication process will take is presented.

Place, publisher, year, edition, pages
2010. , 64 p.
Keyword [en]
802.1x, authentication, EAP-methods, RADIUS, network
National Category
Computer Science Telecommunications
URN: urn:nbn:se:bth-4452Local ID: diva2:831793
Available from: 2015-04-22 Created: 2011-01-04 Last updated: 2015-06-30Bibliographically approved

Open Access in DiVA

fulltext(2900 kB)18 downloads
File information
File name FULLTEXT01.pdfFile size 2900 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
School of Computing
Computer ScienceTelecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 18 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 23 hits
ReferencesLink to record
Permanent link

Direct link