Skip to main content

Table 5 Comparison of protocols by security property

From: 5G wireless P2MP backhaul security protocol: an adaptive approach

Security property

EAP-AKA

EAP-TLS

EAP-IKEv2

HIP

P2MP

SP1

O

O

O

O

O

SP2

O

O

O

O

O

SP3

O

O

O

O

O

SP4

O

O

O

O

O

SP5

X

X

O

O

O

SP6

X

O

O

X

O

SP7

X

X

X

X

O

SP8

O

X

X

X

O

Document

RFC 4187

RFC 5216

RFC 5106

RFC 5201

-

  1. SP1 Confidentiality, SP2 Integrity, SP3 Mutual authentication, SP4 Key exchange, SP5 Perfect forward secrecy, SP6 Key update; SP7 Policy update, SP8 Defense against resource exhaustion attack, O Support, X Not support