{"id":"https://openalex.org/W7156293910","doi":"https://doi.org/10.1109/ojcoms.2026.3687929","title":"Assessing the Performance Impact of Post-Quantum Cryptography on WPA-Enterprise Networks","display_name":"Assessing the Performance Impact of Post-Quantum Cryptography on WPA-Enterprise Networks","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7156293910","doi":"https://doi.org/10.1109/ojcoms.2026.3687929"},"language":"en","primary_location":{"id":"doi:10.1109/ojcoms.2026.3687929","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2026.3687929","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcoms.2026.3687929","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116557945","display_name":"Lukas Popperl","orcid":"https://orcid.org/0000-0003-3620-2336"},"institutions":[{"id":"https://openalex.org/I134656947","display_name":"Esslingen University of Applied Sciences","ror":"https://ror.org/056cezx90","country_code":"DE","type":"education","lineage":["https://openalex.org/I134656947"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Lukas K\u00f6der","raw_affiliation_strings":["Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany"],"raw_orcid":"https://orcid.org/0000-0003-3620-2336","affiliations":[{"raw_affiliation_string":"Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany","institution_ids":["https://openalex.org/I134656947"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106548824","display_name":"Nils Lohmiller","orcid":null},"institutions":[{"id":"https://openalex.org/I134656947","display_name":"Esslingen University of Applied Sciences","ror":"https://ror.org/056cezx90","country_code":"DE","type":"education","lineage":["https://openalex.org/I134656947"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Nils Lohmiller","raw_affiliation_strings":["Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany"],"raw_orcid":"https://orcid.org/0009-0008-1301-4002","affiliations":[{"raw_affiliation_string":"Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany","institution_ids":["https://openalex.org/I134656947"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5134701548","display_name":"Phil Schmieder","orcid":null},"institutions":[{"id":"https://openalex.org/I167360494","display_name":"University of Wuppertal","ror":"https://ror.org/00613ak93","country_code":"DE","type":"education","lineage":["https://openalex.org/I167360494"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Phil Schmieder","raw_affiliation_strings":["University of Wuppertal, Wuppertal, Germany"],"raw_orcid":"https://orcid.org/0009-0007-7196-2791","affiliations":[{"raw_affiliation_string":"University of Wuppertal, Wuppertal, Germany","institution_ids":["https://openalex.org/I167360494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121773125","display_name":"Bastian Buck","orcid":null},"institutions":[{"id":"https://openalex.org/I134656947","display_name":"Esslingen University of Applied Sciences","ror":"https://ror.org/056cezx90","country_code":"DE","type":"education","lineage":["https://openalex.org/I134656947"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Bastian Buck","raw_affiliation_strings":["Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany"],"raw_orcid":"https://orcid.org/0009-0009-9681-727X","affiliations":[{"raw_affiliation_string":"Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany","institution_ids":["https://openalex.org/I134656947"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066802567","display_name":"Michael Menth","orcid":"https://orcid.org/0000-0002-3216-1015"},"institutions":[{"id":"https://openalex.org/I143910747","display_name":"TH Bingen University of Applied Sciences","ror":"https://ror.org/01pxkj057","country_code":"DE","type":"education","lineage":["https://openalex.org/I143910747"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Menth","raw_affiliation_strings":["University of T&#x00FC;bingen, T&#x00FC;bingen, Germany"],"raw_orcid":"https://orcid.org/0000-0002-3216-1015","affiliations":[{"raw_affiliation_string":"University of T&#x00FC;bingen, T&#x00FC;bingen, Germany","institution_ids":["https://openalex.org/I143910747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065269908","display_name":"Tobias Heer","orcid":"https://orcid.org/0000-0003-3119-252X"},"institutions":[{"id":"https://openalex.org/I134656947","display_name":"Esslingen University of Applied Sciences","ror":"https://ror.org/056cezx90","country_code":"DE","type":"education","lineage":["https://openalex.org/I134656947"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tobias Heer","raw_affiliation_strings":["Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany"],"raw_orcid":"https://orcid.org/0000-0003-3119-252X","affiliations":[{"raw_affiliation_string":"Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany","institution_ids":["https://openalex.org/I134656947"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5116557945"],"corresponding_institution_ids":["https://openalex.org/I134656947"],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.86490959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":null,"first_page":"4559","last_page":"4573"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.06920000165700912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.06920000165700912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.061400000005960464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.03579999879002571,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4537999927997589},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.32519999146461487},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.2759999930858612},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.25600001215934753},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.24719999730587006}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.640999972820282},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4537999927997589},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4018999934196472},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32519999146461487},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2831000089645386},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.25600001215934753},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.24719999730587006},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.24230000376701355},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.23600000143051147}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/ojcoms.2026.3687929","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2026.3687929","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2601.22892","is_oa":true,"landing_page_url":"https://arxiv.org/abs/2601.22892","pdf_url":"https://arxiv.org/pdf/2601.22892","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:doaj.org/article:563befb1519942fc9d476a156e1a7e95","is_oa":true,"landing_page_url":"https://doaj.org/article/563befb1519942fc9d476a156e1a7e95","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Communications Society, Vol 7, Pp 4559-4573 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcoms.2026.3687929","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2026.3687929","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1550988088","display_name":null,"funder_award_id":"528745080","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G6028068338","display_name":null,"funder_award_id":"528745080-FIP 68","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"}],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,139],"advent":[1],"of":[2,27,41,55,85,107,129,192],"large-scale":[3],"quantum":[4,117],"computers":[5],"poses":[6],"a":[7,59,126,162,187],"significant":[8],"threat":[9],"to":[10,95,115,135],"contemporary":[11],"network":[12],"security":[13,105,166],"protocols,":[14],"including":[15],"Wi-Fi":[16,203],"Protected":[17],"Access":[18],"(WPA)-Enterprise":[19],"authentication.":[20,46],"To":[21,47],"mitigate":[22],"this":[23,34,48,184],"threat,":[24],"the":[25,38,63,70,74,104,116,173],"adoption":[26],"Post-Quantum":[28],"Cryptography":[29],"(PQC)":[30],"is":[31],"critical.":[32],"In":[33],"work,":[35],"we":[36,50,102,170],"investigate":[37],"performance":[39,91,190],"impact":[40],"PQC":[42,86,145],"algorithms":[43,87],"on":[44],"WPA-Enterprise\u2013based":[45],"end,":[49],"conduct":[51],"an":[52],"experimental":[53],"evaluation":[54,140,191],"authentication":[56,113,148,195],"latency":[57],"using":[58],"testbed":[60],"built":[61],"with":[62,159],"open-source":[64],"tools":[65],"FreeRADIUS":[66],"and":[67,78,88,154,167,196],"hostapd,":[68],"measuring":[69],"time":[71],"spent":[72],"at":[73],"client,":[75],"access":[76],"point,":[77],"RADIUS":[79],"server.":[80],"We":[81],"evaluate":[82],"multiple":[83],"combinations":[84,150],"analyze":[89],"their":[90,121,136],"overhead":[92,175],"in":[93,132,157],"comparison":[94],"currently":[96],"deployed":[97],"cryptographic":[98],"schemes.":[99],"Beyond":[100],"performance,":[101],"assess":[103],"implications":[106],"these":[108],"algorithm":[109],"choices":[110],"by":[111],"relating":[112],"mechanisms":[114],"effort":[118],"required":[119],"for":[120,201],"exploitation.":[122],"This":[123],"perspective":[124],"enables":[125],"systematic":[127],"categorization":[128],"PQ-relevant":[130],"weaknesses":[131],"WPA-Enterprise":[133,194],"according":[134],"practical":[137,199],"urgency.":[138],"results":[141],"show":[142],"that,":[143],"although":[144],"introduces":[146],"additional":[147],"latency,":[149],"such":[151],"as":[152],"ML-DSA-65":[153],"Falcon-1024,":[155],"used":[156],"conjunction":[158],"ML-KEM,":[160],"provide":[161],"favorable":[163],"trade-off":[164],"between":[165],"performance.":[168],"Furthermore,":[169],"demonstrate":[171],"that":[172],"resulting":[174],"can":[176],"be":[177],"effectively":[178],"mitigated":[179],"through":[180],"session":[181],"resumption.":[182],"Overall,":[183],"work":[185],"presents":[186],"first":[188],"real-world":[189],"PQC-enabled":[193],"demonstrates":[197],"its":[198],"feasibility":[200],"enterprise":[202],"deployments.":[204]},"counts_by_year":[],"updated_date":"2026-05-10T08:33:47.465468","created_date":"2026-04-28T00:00:00"}
