• DocumentCode
    614709
  • Title

    Latency evaluation of authentication protocols in centralized 802.11 architecture

  • Author

    Mazlan, M. Hasbullah ; Ariffin, Sharifah Hafizah Syed ; Balfaqih, Mohammed ; Hasnan, S. Norhaizum M. ; Haseeb, Shariq

  • Author_Institution
    Univ. Teknol. Malaysia (UTM), Skudai, Malaysia
  • fYear
    2012
  • fDate
    8-10 Oct. 2012
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    With the growing of telecommunication technology, people can connect to the Internet wirelessly anywhere and anytime. IEEE 802.11 Wireless Local Area Network (WLAN) became the preferred technology for providing Internet access in both indoors and outdoors environments for private and public usage. In order to establish the connection, users need to authenticate and associate with the Access Point (AP) to get access to the network. This was originally not a secured environment. For securing authentication process, many protocols had been introduced to protect the WLANs against unauthorized access from attackers. This paper aims to evaluate the performance of different authentication protocols in Centralized 802.11 Architecture by comparing the latency for Authentication and Association, 802.1x Authentication and Key Management phases. Experiments were performed on a centralized WLAN testbed consisting of Access Controller (AC), AP, RADIUS server and Client in neighbourhood AP environment. We analyse the authentication protocols in error free and error prone scenarios to study the effect of error during re-authentication process during handover. WPA2-Enterprise authentication methods cause the highest re-authentication latency compare with open-system authentication and WPA2-Personal authentication. In the re-authentication component for WPA2Enterprise, 802.1x authentication phase cause highest latency than authentication and association phase and key management phase.
  • Keywords
    Internet; cryptographic protocols; wireless LAN; 802.1x Authentication; AP; IEEE 802.11 wireless local area network; Internet access; RADIUS server; WLAN; WPA2-enterprise authentication methods; WPA2-personal authentication; access controller; access point; authentication protocols; centralized 802.11 architecture; error free scenario; error prone scenarios; key management phases; latency evaluation; private usage; public usage; reauthentication process; telecommunication technology; Authentication; Centralized Architecture; WLAN; Wi-Fi; Wireless Network;
  • fLanguage
    English
  • Publisher
    iet
  • Conference_Titel
    Wireless Communications and Applications (ICWCA 2012), IET International Conference on
  • Conference_Location
    Kuala Lumpur
  • Electronic_ISBN
    978-1-84919-550-8
  • Type

    conf

  • DOI
    10.1049/cp.2012.2113
  • Filename
    6552456