Quantification of the Effect of Security on Performance in Wireless LANs

This paper investigates and quantifies the effect of different security protocols on the performance of a wireless LAN. Experiments were performed on a wireless test-bed and the data obtained was analyzed for throughput, delay and packet loss under different security scenarios. Both TCP and UDP traffic streams were analyzed at three different data rates. The effect of congestion is also quantified. The results reveal that no significant degradation in performance occurs by enabling security protocols in a wireless LAN.

[1]  Abderrahmane Lakas,et al.  Analysis of the effect of security on data and voice traffic in WLAN , 2007, Comput. Commun..

[2]  Wenye Wang,et al.  Measuring performance impact of security protocols in wireless local area networks , 2005, 2nd International Conference on Broadband Networks, 2005..

[3]  Muhammad Junaid,et al.  Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol , 2007 .

[4]  William A. Arbaugh,et al.  YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .

[5]  Jenne Wong,et al.  Performance investigation of secure 802.11 wireless LANs : raising the security bar to which level? , 2003 .

[6]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[7]  Nilufar Baghaei,et al.  IEEE 802.11 wireless LAN security performance using multiple clients , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[8]  Hadj Bourdoucen,et al.  IEEE 802.11 Wireless LAN Security Overview , 2006 .

[9]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[10]  John C. Mitchell,et al.  Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.

[11]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[12]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[13]  Jyh-Cheng Chen,et al.  Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience , 2005, IEEE Communications Magazine.

[14]  I. A. Khatib,et al.  Throughput Analysis of WEP Security in Ad Hoc Sensor Networks , 2005 .

[15]  Songwu Lu,et al.  Securing a Wireless World , 2006, Proceedings of the IEEE.