Concept for Deploying Wireless in the Enterprise Infrastructure: Balancing Security and Positive QoE for the End-Users

This paper presents a concept for deploying wireless in the enterprise infrastructure, especially intended for companies that are usually considered conservative and have strict information security policies. These companies are usually careful while introducing new technologies, so our discussion presents a wireless concept that we believe can satisfy such requirements. The network will run business-critical application and data, voice and video applications, which will extend the wired network. The paper presents comparative analysis for the options that are currently available for wireless networks, while the claims are discussed through live implementation of the proposed concept in a financial institution with commercially available wireless products, produced results from technical point of view and quality of experience (QoE) for the end-users.

[1]  Moustafa Chenine,et al.  Using Enterprise Architecture Models for System Quality Analysis , 2008, 2008 12th International IEEE Enterprise Distributed Object Computing Conference.

[2]  Brian Everitt,et al.  Principles of Multivariate Analysis , 2001 .

[3]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[4]  Fernando Boavida,et al.  Multicast and IP Multicast Support in Wireless Sensor Networks , 2008, J. Networks.

[5]  Z. Hasan A Survey on Shari’Ah Governance Practices in Malaysia, GCC Countries and the UK , 2011 .

[6]  Adrian Farrel,et al.  GMPLS: the promise of the next-generation optical control plane , 2005, IEEE Communications Magazine.

[7]  Fernando Boavida,et al.  Mobility management in IP-based Wireless Sensor Networks , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[8]  Ulrich Frank,et al.  Multi-perspective enterprise modeling (MEMO) conceptual framework and modeling languages , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[9]  Arash Habibi Lashkari,et al.  A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[10]  Ivan Martinovic,et al.  Phishing in the Wireless: Implementation and Analysis , 2007, SEC.

[11]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[12]  Hein S. Venter New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa , 2007, SEC.

[13]  Min-Xiou Chen,et al.  An efficient location tracking structure for wireless sensor networks , 2009, Comput. Commun..

[14]  Tarun Kumar,et al.  Threats and Vulnerabilities in Wireless Mesh Networks , 2009 .

[15]  Jyh-Cheng Chen,et al.  Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience , 2005, IEEE Commun. Mag..

[16]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[17]  I. Jolliffe Principal Component Analysis , 2002 .

[18]  Bülent Tavli,et al.  Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.

[19]  Carl Wijting,et al.  Mesh WLAN networks: concept and system design , 2006, IEEE Wireless Communications.

[20]  John C. Mitchell,et al.  Analysis of the 802.11i 4-way handshake , 2004, WiSe '04.