Abstract
In this paper, we investigated existing and proposed WLAN security technologies designed to improve 802.11 standard. Security concerns over WLAN vulnerabilities are explored, and associated techniques are provided to mitigate these vulnerabilities. We also analyzed the existing architecture types of AAA integrated network security solutions, 802.1X and VPNs. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN testbed architecture. We found that TCP and UDP traffic behaves erratically, when security index changes causing drastically degradation of system performance. In this paper, we present a detail study of performance overhead caused by the most widely used security protocols such as WEP, IPSEC VPN and 801.1X. Furthermore, we analyze the effectiveness of such solution, based on measurement of security indexing model implementation. Performance measurement indicates that 802.1X and VPN method can be used based on the service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users.
General Terms: Mobile security, Wireless privacy, And port based Access point.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nichols, R.K.: Wireless security, 2nd edn. Telecom International, 823 pages. McGraw-Hill, New York (2002)
Askwith, B., Merabti, M., shi, Q., whiteley, K.: Achieving User privacy in Mo-bile Networks. In: proceedings of the 13th Annual computer security Applications Conference, pp. 108–116. IEEE, Los Alamitos (1997)
Moyer, M.: A survey of security Issues in Multicast Communication. IEEE transaction on computer networking 13, 12–23 (1999)
Smith, R.E.: Internet Cryptography. Addison-Wesley Publishing Company, Reading (1999)
Miller, S.k.: Facing challenge of the wireless security. IEEE Transaction on Computer, 16–18 (July 2001)
Sanchez, E., Edwards, R.: Optimization of the Establishment of secure communication channel in wireless Mobile Networks. In: Proceedings of the international parallel and distributed processing symposium. IEEE, Los Alamitos (2002)
van Thanh, D.: Security issues in Mobile ecommerce. In: Proceedings of the 11th International workshop on database and Expert system Applications, pp. 1–14. IEEE, Los Alamitos (2000)
bharghavan, V.: Security issues in mobile communication. In: Proceedings of the second international symposium on Autonomous Decentralized systems, pp. 19–24. IEEE, Los Alamitos (1995)
cooper, D.A., birman, K.P.: Preserving privacy in A Network of Mobile computers. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 26–38. IEEE, Los Alamitos (1995)
patiyoot, D., shepherd, S.j.: Cryptographic security Techniques for wireless Net-works, pp. 36–50. IEEE, Los Alamitos
stalling, W.: Cryptography and network Security, 2nd edn. Prentice Hall, Englewood Cliffs (2000)
Ravi, S., Raghunathan, A., Potlapally, N.: Securing wireless data: system architecture Challenges. Acm journal, 195–200 (October 2002)
Ashley, P., Hilton, H., Vandenwauver, M.: Wired Versus Wireless Security. Internet: white paper/2002 (2002)
Harris, B., Hunt, R.: TCP/IP security threats and attack Methods. Computer communications 22(10), 885–897 (1999)
Hunt, R.: Internet/Intranet firewall Security-policy, Architecture and transaction services. Computer Communications 21, 1107–1123 (1998)
JesiekB.: InternetSecurity-Firewalls, and Internet, http://www.ee.mtu.edu/course/ee465/groupb/fwll.html
Baker, R.H.: Network Security, 2nd edn. Tata. McGraw Hill, New York (1995)
IEEE Standard 802.11i / Draft 3.0. Draft Supplement to ISO/IEC 8802-11/1999(I) ANSI/IEEE Std802.11, (1999 edn.); Specification for Enhanced Security, pp. 5-6 (November 2002)
Rager, A.T.: WEPCrack Project Webpage. Retrieved May 9 (2003), http://sourceforge.net/projects/wepcrack/
Mishra, A., Petroni, N.L., Payne, B.D.: Open1x – Open Source Implementation of IEEE 802.1x, June (2003), http://www.open1x.org/
Convery, S., Miller, D.: SAFE: Wireless LAN Security in Depth, version 2. White paper.Cisco Systems, Inc. (2003), http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safwl_wp.pdf
Microsoft. (2002). Wireless 802.11 Security with Windows XP. Microsoft. http://www.microsoft.com//windowsxp/pro/techinfo/administration/wirelesssecurity/XP80211 Security.doc
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nayak, D., Phatak, D.B., Gulati, V.P. (2005). Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2005. Lecture Notes in Computer Science, vol 3439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31979-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-31979-5_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25584-0
Online ISBN: 978-3-540-31979-5
eBook Packages: Computer ScienceComputer Science (R0)