Security-Performance Tradeoffs in a Class of Wireless Network Scenarios

There has been an extensive and widespread deployment of wireless local area networks (WLANs) for information access. The transmission, being of a broadcast nature, is vulnerable to security threats and hence, the aspect of security provisioning in these networks has assumed an important dimension. The security of the transmitted data over a wireless channel aims at protecting the data from unauthorized access. The objective is achieved by providing advanced security mechanisms. Implementing strong security mechanisms however, affects the throughput performance and increases the complexity of the communication system. In this paper, we investigate the security performance of a WLAN based on IEEE 802.11b/g/n standards on an experimental testbed in congested and uncongested networks in a single and multi-client environment. Experimental results are obtained for a layered security model encompassing nine security protocols in terms of throughput, response time, and encryption overhead. The performance impact of transmission control protocol and user datagram protocol traffic streams on secure wireless networks has also been studied. Through numerical results obtained from the testbed, we have presented quantitative and realistic findings for both security mechanisms as well as network performance. The tradeoff between the strength of the security protocol and the associated performance is analyzed through computer simulation results. The present real time analysis enables the network designers to make intelligent choices about the implementation of security features and the perceived network performance for a given application scenario.

[1]  Wassim El-Hajj,et al.  The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures , 2012, Secur. Commun. Networks.

[2]  Abderrahmane Lakas,et al.  Analysis of the effect of security on data and voice traffic in WLAN , 2007, Comput. Commun..

[3]  Wenye Wang,et al.  Measuring performance impact of security protocols in wireless local area networks , 2005, 2nd International Conference on Broadband Networks, 2005..

[4]  Brahmjit Singh,et al.  Experimental Study to Analyze the Security Performance in Wireless LANs , 2015, Wirel. Pers. Commun..

[5]  Ajaz Hussain Mir,et al.  Quantification of the Effect of Security on Performance in Wireless LANs , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[6]  Brahmjit Singh,et al.  Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption , 2013 .

[7]  Steven Myers,et al.  IPSec: Performance Analysis and Enhancements , 2007, 2007 IEEE International Conference on Communications.

[8]  Li Rui Security Analysis and Improvement of RADIUS Server , 2007 .

[9]  Peng Li,et al.  WPA2 security-bandwith trade-off in 802.11n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).

[10]  Deepak C. Karia,et al.  Performance measurement of WEP and WPA2 on WLAN using OpenVPN , 2015, 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE).

[11]  Vincenzo Mancuso,et al.  QoS Requirements For Multimedia Services , 2007 .

[12]  Dirk Van der Walt FreeRADIUS beginner's guide : manage your network resources with FreeRADIUS , 2011 .

[13]  Mohammed Boulmalf,et al.  Impact of Encryption on the Throughput of Infrastructure WLAN IEEE 802.11g , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[14]  Mohammed Boulmalf,et al.  On the Impact of Security on the Performance of WLANs , 2007, J. Commun..

[15]  Brian Ward The Book of VMware , 2002 .

[16]  Praveen Likhar,et al.  Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis , 2011, ArXiv.

[17]  Alistair Munro,et al.  Performance comparison of cooperative and non-cooperative relaying mechanisms in wireless networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[18]  John C. Mitchell,et al.  Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.

[19]  Gene Tsudik,et al.  Security and privacy in emerging wireless networks [Invited Paper] , 2010, IEEE Wireless Communications.

[20]  Nilufar Baghaei,et al.  IEEE 802.11 wireless LAN security performance using multiple clients , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[21]  Wenye Wang,et al.  On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility , 2007, Mob. Networks Appl..

[22]  Alan Holt,et al.  802.11 Wireless Networks - Security and Analysis , 2010, Computer Communications and Networks.

[23]  Shuangqing Wei,et al.  Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts , 2013, IEEE Trans. Inf. Forensics Secur..

[24]  Pushpendra Kumar Peteriya A Pragmatic Study on Different Stream Ciphers And On Different Flavors of RC4 Stream Cipher , 2012 .

[25]  Samer Khasawneh,et al.  Analyzing the Impact of Security Protocols on Wireless LAN with Multimedia Applications , 2012, SECURWARE 2012.

[26]  Earnest Brandenburg SPEECH INVADES THE MILITARY , 1952 .

[27]  Shaneel Narayan,et al.  Network performance evaluation of wireless IEEE802.11n encryption methods on Windows Vista and Windows Server 2008 operating systems , 2009, 2009 IFIP International Conference on Wireless and Optical Communications Networks.

[28]  Poonam Jindal,et al.  Performance Analysis of Secure Wireless Local Area Network Using Test-Bed , 2014, 2014 Fourth International Conference on Advanced Computing & Communication Technologies.

[29]  S. Taj,et al.  Performance analysis of wireless network with the impact of security mechanisms , 2012, 2012 International Conference on Emerging Technologies.

[30]  Rajarathnam Chandramouli,et al.  Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[31]  William Stallings,et al.  Cryptography and network security , 1998 .

[32]  Pan Feng,et al.  Wireless LAN security issues and solutions , 2012, 2012 IEEE Symposium on Robotics and Applications (ISRA).

[33]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[34]  Ved Prakash Gulati,et al.  Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach , 2005, ISPEC.

[35]  Poonam Jindal,et al.  Impact of transmission power on the performance of secure wireless local area network , 2014, 2014 Students Conference on Engineering and Systems.

[36]  Seong-Moo Yoo,et al.  The Insecurity of Wireless Networks , 2012, IEEE Security & Privacy.

[37]  Nilufar Baghaei,et al.  Security performance of loaded IEEE 802.11b wireless networks , 2004, Comput. Commun..

[38]  H. P. Sinha,et al.  Impact of Security Algorithms on Various Performance Metrics of Wireless LAN , 2022 .