Compact Extensible Authentication Protocol for the Internet of Things: Enabling Scalable and Efficient Security Commissioning
Table 1
Comparison of network usage statistics calculated on the Supplicant/Client node. The statistics have been generated for compact (cEAP) and standard header versions of various EAP methods and regular TEPANOM protocol encapsulation. All statistics have been generated using SEAPOL adaptation layer for the IEEE 802.15.4 network.