Table 3: Comparison between The Proposed and Existing Authentication Protocols.
Parameters |
EEAP-TLS |
EAP-TLS |
EAP-TTLS |
PEAS |
Server Aut. |
PKI Certificate |
PKI Certificate |
PKI Certificate |
PKI Certificate |
Mutual Aut. |
Yes |
Yes |
Yes |
Yes |
UE Aut. |
By the certificate |
By the certificate |
By the certificate |
By the certificate |
User Identity Protection |
Yes |
No |
No |
No |
Roaming Capability |
Yes |
No |
No |
No |
MitM |
No |
No |
Rare cases |
Rare Cases |
Reply Attack |
No |
No |
No |
No |
DDoS |
No |
No |
No |
No |
Impersonation |
No |
No |
No |
No |
Fast Connection |
High |
High |
Low |
Low |