The Performance of the IEEE 802.11i Security Specification on Wireless LANs

Wireless networks are popular due to the mobility afforded by having connectivity without wires. Wireless networks are inherently vulnerable and the IEEE 802.11i security standard was established to address security. Previous research has evaluated the effects of WEP encryption and its variants on wireless network performance. However no previous work has evaluated the effects of the 802.11i specification (implemented as WPA and WPA2) on performance. The aim of this research is to discover the effects of the new WPA2 specification on wireless network throughput, latency, error rate and interaction with multiple clients. It also makes comparisons with the existing security methods, WPA and WEP. Synthetic and real network applications were used to generate network traffic. Various security levels were defined. These ranged from No Security to WPA2, and also included different authentication methods (Pre-shared key and 802.1x EAP-TLS certificate authentication). Performance was measured against these security levels. The results show that while there were statistically significant differences between the security levels, they are small enough to be realistically ignored. This research shows it is possible to establish a secure wireless network, without any noticeable compromise in performance. Using hardware with hardware accelerated security features, there is no reason to use anything less than the WPA2 security specification.

[1]  Dan Dobkin Indoor Propagation and Wavelength , 2002 .

[2]  H. Boland,et al.  Security issues of the IEEE 802.11b wireless LAN , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[3]  kc claffy,et al.  Longitudinal study of Internet traffic in 1998-2003 , 2004 .

[4]  Sridhar Iyer,et al.  Throughput performance of the distributed and point coordination functions of an IEEE 802.11 wireless LAN , 2002 .

[5]  B. Brown 802.11: the security differences between b and i , 2003 .

[6]  Lee Barken How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN , 2003 .

[7]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[8]  Hal Berghel,et al.  WiFi attack vectors , 2005, CACM.

[9]  A. Udaya Shankar,et al.  An Empirical Characterization of Instantaneous Throughput in 802.11b WLANs , 2002 .

[10]  Nilufar Baghaei,et al.  Security performance of loaded IEEE 802.11b wireless networks , 2004, Comput. Commun..

[11]  A. Mahanti Internet Traffic Measurement , 2005 .

[12]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[13]  B. Bing Measured performance of the IEEE 802.11 wireless LAN , 1999, Proceedings 24th Conference on Local Computer Networks. LCN'99.

[14]  Bruce Potter,et al.  Wireless Security's Future , 2003, IEEE Secur. Priv..

[15]  Jeffrey C. Mogul,et al.  Measured capacity of an Ethernet: myths and reality , 1988, CCRV.

[16]  Ray Hunt,et al.  Impact of Security Architectures on Wireless Network Performance , 2003, MWCN.

[17]  Sultan Weatherspoon,et al.  Overview of IEEE 802.11b Security , 2000 .

[18]  David Moore,et al.  Characteristics of fragmented IP traffic on internet links , 2001, IMW '01.

[19]  George C. Polyzos,et al.  TCP and UDP performance over a wireless LAN , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).