M. H. Mazlan, S. Ariffin, Mohammed Balfaqih, S. N. Hasnan, S. Haseeb
{"title":"Latency evaluation of authentication protocols in centralized 802.11 architecture","authors":"M. H. Mazlan, S. Ariffin, Mohammed Balfaqih, S. N. Hasnan, S. Haseeb","doi":"10.1049/cp.2012.2113","DOIUrl":null,"url":null,"abstract":"With the growing of telecommunication technology, people can connect to the Internet wirelessly anywhere and anytime. IEEE 802.11 Wireless Local Area Network (WLAN) became the preferred technology for providing Internet access in both indoors and outdoors environments for private and public usage. In order to establish the connection, users need to authenticate and associate with the Access Point (AP) to get access to the network. This was originally not a secured environment. For securing authentication process, many protocols had been introduced to protect the WLANs against unauthorized access from attackers. This paper aims to evaluate the performance of different authentication protocols in Centralized 802.11 Architecture by comparing the latency for Authentication and Association, 802.1x Authentication and Key Management phases. Experiments were performed on a centralized WLAN testbed consisting of Access Controller (AC), AP, RADIUS server and Client in neighbourhood AP environment. We analyse the authentication protocols in error free and error prone scenarios to study the effect of error during re-authentication process during handover. WPA2-Enterprise authentication methods cause the highest re-authentication latency compare with open-system authentication and WPA2-Personal authentication. In the re-authentication component for WPA2Enterprise, 802.1x authentication phase cause highest latency than authentication and association phase and key management phase. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"122 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET International Conference on Wireless Communications and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/cp.2012.2113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
With the growing of telecommunication technology, people can connect to the Internet wirelessly anywhere and anytime. IEEE 802.11 Wireless Local Area Network (WLAN) became the preferred technology for providing Internet access in both indoors and outdoors environments for private and public usage. In order to establish the connection, users need to authenticate and associate with the Access Point (AP) to get access to the network. This was originally not a secured environment. For securing authentication process, many protocols had been introduced to protect the WLANs against unauthorized access from attackers. This paper aims to evaluate the performance of different authentication protocols in Centralized 802.11 Architecture by comparing the latency for Authentication and Association, 802.1x Authentication and Key Management phases. Experiments were performed on a centralized WLAN testbed consisting of Access Controller (AC), AP, RADIUS server and Client in neighbourhood AP environment. We analyse the authentication protocols in error free and error prone scenarios to study the effect of error during re-authentication process during handover. WPA2-Enterprise authentication methods cause the highest re-authentication latency compare with open-system authentication and WPA2-Personal authentication. In the re-authentication component for WPA2Enterprise, 802.1x authentication phase cause highest latency than authentication and association phase and key management phase. (6 pages)