Protocolos de autenticación de usuarios en el control de acceso a redes inalámbricas: Estudio comparativo

Translated title of the contribution: User authentication protocols in wireless network access control: Comparative study

Gilberto Carrión-Barco, Kriss Ivette Chinchay Quiroz, Violeta Alexandra Peña Fernández, Denny John Fuentes Adrianzén, Alejandro Chayán Coloma

Research output: Contribution to journalArticlepeer-review

Abstract

The purpose of this research is analyze the user authentication protocols in the control of access to wireless local area networks, it presents an applied methodology with a descriptive scope and a qualitative approach under a narrative design of topics; For this, were used three categories (1) Basic authentication characteristics, (2) Authentication protocol working method and (3) Authorization, authentication and accounting functionality; having four user authentication protocols as participants: RADIUS, TACACS+, Diameter and Kerberos. After analyzing each protocol, it was possible to determine that RADIUS is the ideal protocol for user authentication in a wireless network; concluding that the study allowed to demonstrate that RADIUS offers a higher level of security, multiprotocol support, authentication and authorization of users in the control of access to wireless networks.

Translated title of the contributionUser authentication protocols in wireless network access control: Comparative study
Original languageSpanish
Pages (from-to)467-481
Number of pages15
JournalRISTI - Revista Iberica de Sistemas e Tecnologias de Informacao
Volume2022
Issue numberE48
StatePublished - Feb 2022
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2022, Associacao Iberica de Sistemas e Tecnologias de Informacao. All rights reserved.

Fingerprint

Dive into the research topics of 'User authentication protocols in wireless network access control: Comparative study'. Together they form a unique fingerprint.

Cite this