Advertisement

Performance Study of the Impact of Security on 802.11ac Networks

  • Anthony Tsetse
  • Emilien Bonniord
  • Patrick Appiah-Kubi
  • Samuel Tweneboah-Kodua
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 738)

Abstract

Wireless Local Area Networks (WLAN) are gaining popularity due to the ease of use and ubiquity. Notwithstanding, their inherent characteristics make them more vulnerable to security breaches compared to wired networks. IEEE 802.11ac specification is currently the widely used WLAN standard deployed by most organizations.

We study the impact of security on 802.11AC WLANs using different security modes (No Security, Personal and Enterprise Security) using a test WLAN. The performance analysis is based on throughput, delay, jitter, loss ratio and connection time. Our experiments indicate a performance improvement when no security is implemented relative to other security modes. For throughput performance, improvements ranged between 1.6 and 8.2% depending on the transport (TCP/UDP) and network (IPv4/IPv6) layer protocol. Improvements between 2.8 and 7.9% was observed when no security is implemented for delay. Jitter, Loss Ratio and connection time experienced between 1.3 and 18.6% improvement in performance. Though the performance degradation because of implementing security measures on 802.11ac WLANs appear relatively insignificant per the study, we believe the situation could be different when a heterogeneously complex setup is used. However, other factors (e.g. channel congestion, interference etc.) may equally be responsible for the performance degradation in WLANs that may not be necessarily security related.

Keywords

Security Wireless Network Performance 802.11ac IPv4 IPv6  

References

  1. 1.
    IEEE Standards Association, Wireless LAN medium access control wireless LAN (MAC) and physical layer (PHY) specifications. (2016), http://standards.ieee.org/getieee802/download/802.11-2016.pdf. Accessed 2 Aug 2017
  2. 2.
    R.V. Nee, Breaking the gigabit-per-second barrier with 802.11ac. IEEE Wirel. Commun. Mag. 18(2), 4 (2011)MathSciNetCrossRefGoogle Scholar
  3. 3.
    S.N. Kelkar, A survey and performance analysis of IEEE 802.11ac Wi-Fi networking. Int. J. Comput. Sci. Inf. Technol. 3(2), 808–814 (2015)Google Scholar
  4. 4.
    M.-D. Dianu, J. Riihijarvi, M. Petrova, Measurement- based study of the performance of IEEE 802.11ac in an indoor environment, in IEEE International Conference on Communications, Sydney, 2014Google Scholar
  5. 5.
    IEEE Standards Association, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. (2007), [Online]. http://standards.ieee.org/getieee802/download/802.11-2007.pdf. Accessed 2 Aug 2017
  6. 6.
    FreeRADIUS, FreeRADIUS, [Online]. http://freeradius.org/. Accessed 1 Aug 2017
  7. 7.
    Nescout, Netscout White Paper, The impact of 802.11ac wireless networks on network technicians, Nescout, [Online]. http://enterprise.netscout.com/edocs/white-paper-impact-80211ac-wireless-networks-network-technicians. Accessed 1 Aug 2017
  8. 8.
    P. Li, S.S. Kolahi, M. Safdari, M. Argawe, Effect of WPA2 security on IEEE 802.11n bandwidth and round trip time in peer-peer wireless local area networks. Workshops of International Conference on Advanced Information Networking and Applications, in International Conference on Advanced Information Networking and Applications, 2011Google Scholar
  9. 9.
    L. Kriaia, E.C. Molero, T. R. Gross, Evaluating 802.11ac features in indoor WLAN: an empirical study of performance and fairness. in ACM International Workshop on Wireless Network Testbeds, Experimental evaluation & CHaracterization, New York City, 2016Google Scholar
  10. 10.
    H. Ong, J. Kneckt, O. Alanen, Z. Chang, T.T. Huovinen, T. Nihtila, EEE 802.11ac: Enhancements for very high throughput WLANs, in IEEE Personal Indoor Mobile Radio Communitcations, 2011Google Scholar
  11. 11.
    Z. Chang, O. Alanen, T. Huovinen, T. Nihtila, H. Ong, J. Kneckt, T. Ristaniemi, Performance analysis of IEEE 802.11ac DCF with hidden nodes, in EEE 75th Vehicular Technology Conference (VTC Spring), 2012Google Scholar
  12. 12.
    T. Vanhatupa, Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory and Practice (Ekahau Inc, 2015)Google Scholar
  13. 13.
    R. Mardeni, K. Anuar, A. Salamat, M.G.I. Yusop, Investigation of IEEE 802.11ac signal strength performance in Wi-Fi communication systems, in Research World International Conference, Osaka, 2016Google Scholar
  14. 14.
    P.D and B.D, The impact of security overheads on 802.11 WLAN throughputGoogle Scholar
  15. 15.
    H. Ce, Effects of Security Features on the Performance of Voice over WLAN (Stanford University Press, Stanford, 2004)Google Scholar
  16. 16.
    P. Likhar, R.S. Yadav, K.M. Rao, Securing IEEE 802.11g WLAN using OpenVPN and its impact analysis. IJNSA 3(6), 97–113 (2011) CrossRefGoogle Scholar
  17. 17.
    W. Agosto-Padilla, A. Loukili, A. Tsetse, A. Wijesinha, R. Karne, 802.11n wireless LAN performance for mobile devices, in IEEE/ACS International Conference of Computer Systems and Applications (AICCSA), 2016Google Scholar
  18. 18.
    P. Jindal, B. Singh, Quantitative analysis of the security performance in WLANs. J. King Saud. Univ. 29(3), 246–268 (2014)Google Scholar
  19. 19.
    Wireshark, Wireshark protocol analyzer, [Online]. https://www.wireshark.org/. Accessed 1 Aug 2017
  20. 20.
    IPerf, [Online]. https://iperf.fr/iperf-download.php. Accessed 2 Aug 2017
  21. 21.
    S. Saha, P. Deshpande, P. Inamdar, R. Sheshadri, D. Koutsonikolas, Power-throughput tradeoffs of 802.11ac in smartphones, in IEEE Conference on Computer Communications (INFOCOM), 2015Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Anthony Tsetse
    • 1
  • Emilien Bonniord
    • 2
  • Patrick Appiah-Kubi
    • 3
  • Samuel Tweneboah-Kodua
    • 4
  1. 1.Department of Computer ScienceNorthern Kentucky UniversityHighland HeightsUSA
  2. 2.IUT LaninionUniversity De RennesRennesFrance
  3. 3.Information and Technology University of Maryland University CollegeLargoUSA
  4. 4.School of Technology, Ghana Institute of Management and Public AdministrationAccraGhana

Personalised recommendations