Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs

In this paper, we study the overhead introduced by the advanced encryption standard cipher in the context of wireless LANs, specifically at the medium access control layer, as described in the 802.11 standard developed by the 802.11n task group. The advanced encryption standard is incorporated into existing aggregation schemes for 802.11 wireless LANs in order to achieve secure transmission of frames. We compute the maximum throughput, optimal frame, and fragment sizes which can be achieved in this context and compare them to the optimal values when encryption is not used. We evaluate the delay performance of such a scheme in the context of encryption and study asymptotic properties of the medium access control layer efficiency, expected frame size, and throughput.

[1]  XiaoYang,et al.  Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols , 2003 .

[2]  J. Tourrilhes Packet frame grouping: improving IP multimedia performance over CSMA/CA , 1998, ICUPC '98. IEEE 1998 International Conference on Universal Personal Communications. Conference Proceedings (Cat. No.98TH8384).

[3]  Theodore Antonakopoulos,et al.  CSMA/CA performance under high traffic conditions: throughput and delay analysis , 2002, Comput. Commun..

[4]  Thierry Turletti,et al.  Modeling and analysis of slow CW decrease IEEE 802.11 WLAN , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[5]  Ieee . Wg Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification , 2003 .

[6]  David Malone,et al.  Aggregation with fragment retransmission for very high-speed WLANs , 2009, TNET.

[7]  Yang Xiao Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.

[8]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[9]  Yang Xiao,et al.  Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches , 2010, IEEE Transactions on Vehicular Technology.

[10]  Qijun Gu,et al.  Defence against packet injection in ad hoc networks , 2007, Int. J. Secur. Networks.

[11]  Sync TGn TGn Sync Proposal Technical Specification , 2004 .

[12]  Yang Xiao,et al.  Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs , 2005, IEEE Transactions on Wireless Communications.

[13]  Yang Xiao,et al.  Building a wireless capturing tool for WiFi , 2009, Secur. Commun. Networks.

[14]  Nitin H. Vaidya,et al.  A wireless MAC protocol using implicit pipelining , 2006, IEEE Transactions on Mobile Computing.

[15]  Sunghyun Choi,et al.  EBA: an enhancement of the IEEE 802.11 DCF via distributed reservation , 2005, IEEE Transactions on Mobile Computing.

[16]  Joseph B. Evans,et al.  Wireless networking security: open issues in trust, management, interoperation and measurement , 2006, Int. J. Secur. Networks.

[17]  Yang Xiao,et al.  MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[18]  Yang Xiao Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.

[19]  Robert A. Malaney Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.

[20]  Kee Chaing Chua,et al.  A Capacity Analysis for the IEEE 802.11 MAC Protocol , 2001, Wirel. Networks.

[21]  Hsiao-Hwa Chen,et al.  IEEE 802.11n MAC frame aggregation mechanisms for next-generation high-throughput WLANs , 2008, IEEE Wireless Communications.

[22]  Luigi Fratta,et al.  Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LANs , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.

[23]  Yang Xiao IEEE 802.11 performance enhancement via concatenation and piggyback mechanisms , 2005, IEEE Transactions on Wireless Communications.

[24]  Sanjay Gupta,et al.  Performance modeling of asynchronous data transfer methods of IEEE 802.11 MAC protocol , 1997, Wirel. Networks.

[25]  Yang Xiao,et al.  Throughput and delay limits of IEEE 802.11 , 2002, IEEE Communications Letters.

[26]  Raheem A. Beyah,et al.  Using link RTT to passively detect unapproved wireless nodes , 2009, Int. J. Secur. Networks.

[27]  Yang Xiao,et al.  Optimization between AES security and performance for IEEE 802.15.3 WPAN , 2009, IEEE Transactions on Wireless Communications.

[28]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[29]  Lars R. Knudsen,et al.  Advanced Encryption Standard (AES) - An Update , 1999, IMACC.

[30]  David Malone,et al.  A new MAC scheme for very high-speed WLANs , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[31]  Vasileios Karyotis,et al.  A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks , 2006, Int. J. Secur. Networks.

[32]  Yang Xiao,et al.  Efficient MAC strategies for the IEEE 802.11n wireless LANs , 2006, Wirel. Commun. Mob. Comput..

[33]  Kin K. Leung,et al.  On optimizing backoff counter reservation and classifying stations for the IEEE 802.11 distributed wireless LANs , 2006, IEEE Transactions on Parallel and Distributed Systems.

[34]  Yuanyuan Yang,et al.  Priority-based opportunistic MAC protocol in IEEE 802.11 WLANs , 2008, Int. J. Sens. Networks.

[35]  Yang Xiao A simple and effective priority scheme for IEEE 802.11 , 2003, IEEE Communications Letters.

[36]  Bo Sun,et al.  Performance Analysis of Advanced Encryption Standard (AES). , 2006 .

[37]  Daisuke Takahashi,et al.  Retrieving knowledge from auditing log-files for computer and network forensics and accountability , 2008, Secur. Commun. Networks.

[38]  Yang Xiao,et al.  IEEE 802.11n: enhancements for higher throughput in wireless LANs , 2005, IEEE Wireless Communications.

[39]  V. Vitsas,et al.  Enhancing performance of the IEEE 802.11 distributed coordination function via packet bursting , 2004, IEEE Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004..

[40]  Yi Pan,et al.  Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs , 2006, Int. J. Wirel. Mob. Comput..

[41]  Pin-Han Ho,et al.  A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks , 2008, Int. J. Secur. Networks.

[42]  Haitao Wu,et al.  Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[43]  Mark A. Shayman,et al.  On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.

[44]  Ruhai Wang,et al.  NIS05-1: Performance Analysis of Advanced Encryption Standard (AES) , 2006, IEEE Globecom 2006.

[45]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[46]  Mani B. Srivastava,et al.  Adaptive frame length control for improving wireless link throughput, range, and energy efficiency , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[47]  Marco Conti,et al.  Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit , 2000, TNET.

[48]  Yang Xiao,et al.  Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols , 2003, MOCO.

[49]  Edward W. Knightly,et al.  Opportunistic media access for multirate ad hoc networks , 2002, MobiCom '02.

[50]  Chuan Heng Foh,et al.  Comments on IEEE 802.11 saturation throughput analysis with freezing of backoff counters , 2005, IEEE Communications Letters.

[51]  G. Bianchi,et al.  IEEE 802.11-saturation throughput analysis , 1998, IEEE Communications Letters.

[52]  Yang Xiao Efficient MAC strategies for the IEEE 802.11n wireless LANs: Research Articles , 2006 .

[53]  Yang Xiao,et al.  Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks , 2007, Int. J. Wirel. Mob. Comput..