Table 3: Comparison between The Proposed and Existing Authentication Protocols.
|
Parameters |
EEAP-TLS |
EAP-TLS |
EAP-TTLS |
PEAS |
|
Server Aut. |
PKI Certificate |
PKI Certificate |
PKI Certificate |
PKI Certificate |
|
Mutual Aut. |
Yes |
Yes |
Yes |
Yes |
|
UE Aut. |
By the certificate |
By the certificate |
By the certificate |
By the certificate |
|
User Identity Protection |
Yes |
No |
No |
No |
|
Roaming Capability |
Yes |
No |
No |
No |
|
MitM |
No |
No |
Rare cases |
Rare Cases |
|
Reply Attack |
No |
No |
No |
No |
|
DDoS |
No |
No |
No |
No |
|
Impersonation |
No |
No |
No |
No |
|
Fast Connection |
High |
High |
Low |
Low |