The purpose of this research is analyze the user authentication protocols in the control of access to wireless local area networks, it presents an applied methodology with a descriptive scope and a qualitative approach under a narrative design of topics; For this, were used three categories (1) Basic authentication characteristics, (2) Authentication protocol working method and (3) Authorization, authentication and accounting functionality; having four user authentication protocols as participants: RADIUS, TACACS+, Diameter and Kerberos. After analyzing each protocol, it was possible to determine that RADIUS is the ideal protocol for user authentication in a wireless network; concluding that the study allowed to demonstrate that RADIUS offers a higher level of security, multiprotocol support, authentication and authorization of users in the control of access to wireless networks.
|Translated title of the contribution||User authentication protocols in wireless network access control: Comparative study|
|Number of pages||15|
|Journal||RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao|
|State||Published - Feb 2022|
Bibliographical notePublisher Copyright:
© 2022, Associacao Iberica de Sistemas e Tecnologias de Informacao. All rights reserved.