In wireless networks, security is an essential feature that can be provided using a variety of protocols. On the other hand, the security protocols can affect applications to varying degrees depending on the network conditions. In this paper, we propose to evaluate the overhead introduced by the security mechanisms in WLAN such as authentication. To do so, we develop an analytical model based on random errors to evaluate the authentication delay for various error rates taking into account the reliability mechanisms involved. We also measure the authentication delay for WLAN 802.11b using CISCO access point and client cards. We generate the average, minimum and maximum delay for the different authentication configuration available in the CISCO security suite. The analytical and the experimental results are compliant. The major contributor of the authentication delay is the probing time needed to detect the surrounding access point.
[1]
Bernhard Walke,et al.
IEEE 802.11 Wireless Local Area Networks
,
2006
.
[2]
Bernard P. Zajac.
Applied cryptography: Protocols, algorithms, and source code in C
,
1994
.
[3]
William A. Arbaugh,et al.
An empirical analysis of the IEEE 802.11 MAC layer handoff process
,
2003,
CCRV.
[4]
Adi Shamir,et al.
Weaknesses in the Key Scheduling Algorithm of RC4
,
2001,
Selected Areas in Cryptography.
[5]
Frank Stajano,et al.
Security for Ubiquitous Computing
,
2002,
ICISC.
[6]
David A. Wagner,et al.
Intercepting mobile communications: the insecurity of 802.11
,
2001,
MobiCom '01.