Research Article

Compact Extensible Authentication Protocol for the Internet of Things: Enabling Scalable and Efficient Security Commissioning

Table 1

Comparison of network usage statistics calculated on the Supplicant/Client node. The statistics have been generated for compact (cEAP) and standard header versions of various EAP methods and regular TEPANOM protocol encapsulation. All statistics have been generated using SEAPOL adaptation layer for the IEEE 802.15.4 network.

TX packets TX data RX packets RX data Total packets Total data

TEPANOM 2 210 B 17 1533 B 19 1743 B
EAP-TEPANOM 2 98 B 9 1020 B 11 1118 B
cEAP-TEPANOM 2 90 B 9 985 B 11 1075 B
EAP-MD5 3 66 B 3 59 B 6 125 B
cEAP-MD5 3 54 B 3 49 B 6 103 B
EAP-PSK 5 181 B 4 160 B 9 341 B
cEAP-PSK 5 161 B 4 145 B 9 306 B
EAP-TLS-ECDSA-160 12 271 B 17 812 B 29 1083 B
cEAP-TLS-ECDSA-160 12 223 B 17 745 B 29 960 B
EAP-TLS-ECDSA-256 13 286 B 18 931 B 31 1217 B
cEAP-TLS-ECDSA-256 13 234 B 18 860 B 31 1094 B
EAP-TLS-RSA-480 19 376 B 24 1566 B 43 1942 B
cEAP-TLS-RSA-480 19 300 B 24 1471 B 43 1771 B
EAP-TLS-RSA-512 20 397 B 25 1627 B 45 2024 B
cEAP-TLS-RSA-512 20 317 B 25 1528 B 45 1845 B
EAP-TLS-RSA-1024 27 496 B 32 2370 B 59 2866 B
cEAP-TLS-RSA-1024 27 388 B 32 2243 B 59 2631 B
EAP-TLS-RSA-2048 43 712 B 48 4200 B 91 4912 B
cEAP-TLS-RSA-2048 43 540 B 48 4009 B 91 4549 B