WLAN security performance study (original) (raw)

The impact of various security mechanisms on the WLAN performance

Various security techniques were developed to improve the security of the communication in a WLAN. Their usage in a WLAN can degrade the network performances.This paper presents the results of experiments conducted by the authors regarding the capability of a WLAN to transfer data files of different sizes, under normal and congested traffic loads, while various security mechanisms are used. Two levels of communication were chosen to carry out the measurements: TCP/UDP and FTP/ HTTP.

Security performance of loaded IEEE 802.11b wireless networks

Computer Communications, 2004

Existing solutions for wireless LAN networks have been subject to security vulnerabilities and previous study has addressed and evaluated the security performance of IEEE 802.11b wireless networks using single server -client architecture and simple traffic models. This paper describes research into the effect of multiple security mechanisms on the performance of multi-client congested and uncongested networks using a layered security model. It evaluates the interaction between different security layers and their effects on performance (response time and throughput). This research also evaluates the performance effect of different TCP and UDP packet size distributions on secure wireless networks. The benefits of this wireless network study focus on determining ways in which to configure wireless networks such that security requirements can be met in relation to quantifiable performance impact in practical situations. q

A Comparative Study on Security Levels in WLAN

International Journal of Computer Applications, 2014

Security of wireless network is vital research area for the researchers and scientists. This work demonstrates a deep study of security levels in Wireless Local Area Networks (WLAN). This study includes different security schemes of WLAN like Security Aware Packet Scheduling Algorithm (SPSS), Automated Security-Aware Packet Scheduling (ASPS), Bio-cryptic Security-Aware Packet Scheduling (BSPS), Enhanced Bio-cryptic Security-Aware Packet Scheduling (EBSPS), Enhanced Merged Bio-cryptic Security-Aware Packet Scheduling (EMBSPS) and Multi Merged Biocryptic Security-Aware Packet Scheduling (MMBSPS). To analyze the performance of the each algorithm some simulations were conducted by considering different parameters like Security Level (SL), size of Wireless Data Packet (WDP), Speedy Authentication (SA) and Load-onnetwork Switch (LOS). The simulations were performed using Matlab and Network Simulator-2. Finally our experiment result concludes that, each algorithm has got its own advantages and limitations.

Investigation into IEEE 802.11 Security Issues affecting Wireless Network

Wireless networking is one of the exciting developments in the world of networking technology. After the introduction of IEEE 802.11 Ethernet standard, Wi-Fi has become the most widely adopted wireless networking type on the wireless network environment. Since wireless networking is easy to deploy and upgrade and with decent data rate available today at low cost, implementation of wireless networking is growing all over the place. Organizations and enterprises are switching from the traditional wired networks to wireless networking. Wireless can serve in many capacities, from a simple extension to a distribution point. One of the leading glitches with wireless networking is that, the wireless networking devices provide no security as they come out of their boxes. Considering the fact that wireless networks are built on a shared medium and data packets float through the air on radio waves, security cannot be overemphasized when dealing with wireless networking. It is arguable that many network users don't have procedures when they deploy their WLAN for the first time. It is the dearth of procedures that help attackers get into any networks they want. This paper seeks to demystify the security issues of the IEEE 802.11 wireless standards. The paper goes on to address these security concerns and points out the method used to secure a wireless network.

The impact of the security mechanisms in the throughput of the WLAN networks

2018

Wireless Local Area Network (WLAN) is the fastest growing technology in the telecommunications industry. The huge increase in the use of this technology has provided great opportunities for hackers and abusers as well. Attackers are becoming more and more sophisticated, obtaining access to sensitive data, especially in wireless networks. In order to prevent unauthorized access, the security issue must be addressed appropriately and should be treated by using strong security mechanisms such as advanced encryption algorithms and efficient legalization processes, To ensure user satisfaction, a WLAN should provide not only security to the clients, but the performance as well. However, security mechanisms can often hinder network performance. In this paper we will address the impact of the security mechanisms on the throughput performance of WLAN networks. For our goal we have set up a simple WLAN network and carried out measurements while changing the security methods. We have evaluated...

Quantitative analysis of the security performance in wireless LANs

Journal of King Saud University - Computer and Information Sciences, 2017

A comprehensive experimental study to analyze the security performance of a WLAN based on IEEE 802.11 b/g/n standards in various network scenarios is presented in this paper. By setting-up an experimental testbed we have measured results for a layered security model in terms of throughput, response time, encryption overheads, frame loss and jitter. Through numerical results obtained from the testbed, we have presented quantitative as well as realistic findings for both security mechanisms and network performance. It establishes the fact that there is always a tradeoff between the security strength and the associated network performance. It is observed that the non-roaming network always performs better than the roaming network under all network scenarios. To analyze the benefits offered by a particular security protocol a relative security strength index model is demonstrated. Further we have presented the statistical analysis of our experimental data. We found that different security protocols have different robustness against mobility. By choosing the robust security protocol, network performance can be improved. The presented analysis is significant and useful with reference to the assessment of the suitability of security protocols for given real time application.

On the Impact of Security on the Performance of WLANs

Journal of Communications, 2007

This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different implementations of encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on the throughput over WLAN IEEE 802.11g. This paper also addresses the different issues related to the security protocols currently used in WLAN IEEE 802.11g and demonstrates how these issues affect the final results of the experiments conducted. The results show that within the same access point range the security adds moderate degradation on the throughput that may affect some applications over both infrastructure and ad hoc WLANs.

IEEE 802.11 wireless LAN security performance using multiple clients

Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955), 2004

IEEE 802.11 Wireless Networks have gained popularity, providing users mobility and flexibility in accessing information. Existing solutions for wireless LAN networks have been exposed to security vulnerabilities. Previous study has evaluated the security performance of IEEE 802.11 wireless networks using single server-client architecture. This research investigated the effect of multiple security mechanisms on the performance of multi-client congested and un-congested networks. The effect of different TCP and UDP packet sizes on performance of secure networks was also studied. The results showed that WEP encryption significantly degrades the performance of congested wireless networks. Network performance degradation increased as the number of clients was increased under all security mechanisms.

INVESTIGATION INTO IEEE 802.11 SECURITY ISSUES AFFECTING WIRELESS NETWORKS

Wireless networking is one of the exciting developments in the world of networking technology. After the introduction of IEEE 802.11 Ethernet standard, Wi-Fi has become the most widely adopted wireless networking type on the wireless network environment. Since wireless networking is easy to deploy and upgrade and with decent data rate available today at low cost, implementation of wireless networking is growing all over the place. Organizations and enterprises are switching from the traditional wired networks to wireless networking. Wireless can serve in many capacities, from a simple extension to a distribution point. One of the leading glitches with wireless networking is that, the wireless networking devices provide no security as they come out of their boxes. Considering the fact that wireless networks are built on a shared medium and data packets float through the air on radio waves, security cannot be overemphasized when dealing with wireless networking. It is arguable that many network users don't have procedures when they deploy their WLAN for the first time. It is the dearth of procedures that help attackers get into any networks they want. This paper seeks to demystify the security issues of the IEEE 802.11 wireless standards. The paper goes on to address these security concerns and points out the method used to secure a wireless network.

Impact of security protocols on performance in IEEE 802.11 wireless networks

2013

of different security protocols on the performance of IEEE 802.11 wireless networks. Experiments were conducted under laboratory conditions on a wireless network infrastructure that consists of wireless access point and wireless network clients. The goal of this work was to measure the overhead associated with applying different security protocols on the performance of the wireless networks. Obtained data analysis throughput, transfer time and packet loss performances in different security scenarios. In this paper analyzed are TCP ent packet transmission speeds. The effect of the wireless radio channel congestion is also quantidegradation of performance in IEEE 802.11 wireless networks when security protocols are enabled.