Abstract
With the increasing popularity of Wireless Local Area Network (WLAN) in various sectors, security has become a primary concern. This has been necessitated by the fact that free-space radio transmission in wireless networks makes eavesdropping easy and consequently a security breach may result in unauthorized access, information theft, interference and service degradation. Virtual Private Networks (VPNs) have emerged as an important solution to security threats surrounding the use of public networks for private communications. While VPNs for wired line networks have matured in both research and commercial environments, the design and deployment of VPNs for WLAN is still an evolving field. This paper consist a brief description of OpenVPN, a transport layer tunneling VPN solution, used for securing IEEE 802.11g WLAN. In this paper we have presented experimental evaluation of OpenVPN with an analysis of its impact on performance of IEEE 802.11g.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Karygiannis, T., Owens, L.: Wireless Network Security 802.11, Bluetooth and Handheld Devices, National Institute of technology. In: Special Publication, pp. 800–848 (2002)
Zahur, Y., Yang, T.A.: Wireless LAN Security and Laboratory Designs. Journal of Computing Sciences in Colleges 19, 44–60 (2004)
Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (2001)
Faria, D.B., Cheriton, D.R.: DoS and Authentication in Wireless Public Access Networks. In: Proceedings of ACM Workshop on Wireless Security, pp. 47–56 (2002)
Arbaugh, W.A., Shankar, N., Wang, J., Zhang, K.: Your 802.11 network has no clothes. IEEE Wireless Communications Magazine (2002)
Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Selected Areas in Cryptography, pp. 1–24 (2001)
Stubblefield, A., Ioannidis, J., Rubin, A.D.: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. In: AT&T Labs Technical Report TD-4ZCPZZ (2001)
J.: hong, R. Lemachheche: WEP protocol Weaknesses and Vulnerabilities. In: ECE 578 Computer Networks and Security (2003)
OpenVPN, http://openvpn.net/
IEEE Std 802.11TM-2007 (Revision of IEEE Std 802.11-199)
OpenSSL-The Open Source toolkit for SSL/TLS, http://www.openssl.org
TUN-TAP, http://en.wikipedia.org/wiki/TUN/TAP
TUN-TAP FAQ, http://vtun.sourceforge.net/tun/faq.html
Stephan, E.: IP Performance Metrics (IIPM) Metrics Registry. In: RFC 4148 (2005)
Bradner, S., McQuaid, J.: Benchmarking Methodology for Network Interconnect Devices. In: RFC 2544 (2005)
Almes, G., Kalidindi, S., Zekauskas, M.: A One-way Delay Metric for IPPM. In: RFC 2679 (1999)
Demichelis, C., Chimento, P.: IP Packet Delay Variation. In: RFC 3393 (2002)
Feilner, M.: OpenVPN: Building and Integrating Virtual Private Networks, pp. 127–154. Packt Publishing (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Likhar, P., Yadav, R.S., Rao, M.K. (2011). Performance Evaluation of Transport Layer VPN on IEEE 802.11g WLAN. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Trends in Network and Communications. WeST NeCoM WiMoN 2011 2011 2011. Communications in Computer and Information Science, vol 197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22543-7_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-22543-7_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22542-0
Online ISBN: 978-3-642-22543-7
eBook Packages: Computer ScienceComputer Science (R0)