Table 3: Comparison between The Proposed and Existing Authentication Protocols.

Parameters

EEAP-TLS

EAP-TLS

EAP-TTLS

PEAS

Server Aut.

PKI

Certificate

PKI

Certificate

PKI

Certificate

PKI

Certificate

Mutual Aut.

Yes

Yes

Yes

Yes

UE Aut.

By the certificate

By the certificate

By the certificate

By the certificate

User Identity Protection

Yes

No

No

No

Roaming Capability

Yes

No

No

No

MitM

No

No

Rare cases

Rare Cases

Reply Attack

No

No

No

No

DDoS

No

No

No

No

Impersonation

No

No

No

No

Fast Connection

High

High

Low

Low