Quantitative analysis of the security performance in wireless LANs
Autor: | Brahmjit Singh, Poonam Jindal |
---|---|
Rok vydání: | 2017 |
Předmět: |
General Computer Science
Computer science Security Parameter Index Roaming network 02 engineering and technology lcsh:QA75.5-76.95 Robustness (computer science) 0202 electrical engineering electronic engineering information engineering Network performance UDP GeneralLiterature_REFERENCE(e.g. dictionaries encyclopedias glossaries) ComputingMilieux_MISCELLANEOUS business.industry Testbed 020206 networking & telecommunications Cryptographic protocol Computer security model Frame loss Throughput Security protocols Network Access Control 020201 artificial intelligence & image processing lcsh:Electronic computers. Computer science Roaming TCP business Security strength Computer network |
Zdroj: | Journal of King Saud University: Computer and Information Sciences, Vol 29, Iss 3, Pp 246-268 (2017) |
ISSN: | 1319-1578 |
DOI: | 10.1016/j.jksuci.2014.12.012 |
Popis: | A comprehensive experimental study to analyze the security performance of a WLAN based on IEEE 802.11 b/g/n standards in various network scenarios is presented in this paper. By setting-up an experimental testbed we have measured results for a layered security model in terms of throughput, response time, encryption overheads, frame loss and jitter. Through numerical results obtained from the testbed, we have presented quantitative as well as realistic findings for both security mechanisms and network performance. It establishes the fact that there is always a tradeoff between the security strength and the associated network performance. It is observed that the non-roaming network always performs better than the roaming network under all network scenarios. To analyze the benefits offered by a particular security protocol a relative security strength index model is demonstrated. Further we have presented the statistical analysis of our experimental data. We found that different security protocols have different robustness against mobility. By choosing the robust security protocol, network performance can be improved. The presented analysis is significant and useful with reference to the assessment of the suitability of security protocols for given real time application. |
Databáze: | OpenAIRE |
Externí odkaz: |