From: 5G wireless P2MP backhaul security protocol: an adaptive approach
Security property | EAP-AKA | EAP-TLS | EAP-IKEv2 | HIP | P2MP |
---|---|---|---|---|---|
SP1 | O | O | O | O | O |
SP2 | O | O | O | O | O |
SP3 | O | O | O | O | O |
SP4 | O | O | O | O | O |
SP5 | X | X | O | O | O |
SP6 | X | O | O | X | O |
SP7 | X | X | X | X | O |
SP8 | O | X | X | X | O |
Document | RFC 4187 | RFC 5216 | RFC 5106 | RFC 5201 | - |