Skip to main content

Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach

  • Conference paper
Information Security Practice and Experience (ISPEC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3439))

Abstract

In this paper, we investigated existing and proposed WLAN security technologies designed to improve 802.11 standard. Security concerns over WLAN vulnerabilities are explored, and associated techniques are provided to mitigate these vulnerabilities. We also analyzed the existing architecture types of AAA integrated network security solutions, 802.1X and VPNs. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN testbed architecture. We found that TCP and UDP traffic behaves erratically, when security index changes causing drastically degradation of system performance. In this paper, we present a detail study of performance overhead caused by the most widely used security protocols such as WEP, IPSEC VPN and 801.1X. Furthermore, we analyze the effectiveness of such solution, based on measurement of security indexing model implementation. Performance measurement indicates that 802.1X and VPN method can be used based on the service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users.

General Terms: Mobile security, Wireless privacy, And port based Access point.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nichols, R.K.: Wireless security, 2nd edn. Telecom International, 823 pages. McGraw-Hill, New York (2002)

    Google Scholar 

  2. Askwith, B., Merabti, M., shi, Q., whiteley, K.: Achieving User privacy in Mo-bile Networks. In: proceedings of the 13th Annual computer security Applications Conference, pp. 108–116. IEEE, Los Alamitos (1997)

    Chapter  Google Scholar 

  3. Moyer, M.: A survey of security Issues in Multicast Communication. IEEE transaction on computer networking 13, 12–23 (1999)

    Google Scholar 

  4. Smith, R.E.: Internet Cryptography. Addison-Wesley Publishing Company, Reading (1999)

    Google Scholar 

  5. Miller, S.k.: Facing challenge of the wireless security. IEEE Transaction on Computer, 16–18 (July 2001)

    Google Scholar 

  6. Sanchez, E., Edwards, R.: Optimization of the Establishment of secure communication channel in wireless Mobile Networks. In: Proceedings of the international parallel and distributed processing symposium. IEEE, Los Alamitos (2002)

    Google Scholar 

  7. van Thanh, D.: Security issues in Mobile ecommerce. In: Proceedings of the 11th International workshop on database and Expert system Applications, pp. 1–14. IEEE, Los Alamitos (2000)

    Google Scholar 

  8. bharghavan, V.: Security issues in mobile communication. In: Proceedings of the second international symposium on Autonomous Decentralized systems, pp. 19–24. IEEE, Los Alamitos (1995)

    Chapter  Google Scholar 

  9. cooper, D.A., birman, K.P.: Preserving privacy in A Network of Mobile computers. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 26–38. IEEE, Los Alamitos (1995)

    Google Scholar 

  10. patiyoot, D., shepherd, S.j.: Cryptographic security Techniques for wireless Net-works, pp. 36–50. IEEE, Los Alamitos

    Google Scholar 

  11. stalling, W.: Cryptography and network Security, 2nd edn. Prentice Hall, Englewood Cliffs (2000)

    Google Scholar 

  12. Ravi, S., Raghunathan, A., Potlapally, N.: Securing wireless data: system architecture Challenges. Acm journal, 195–200 (October 2002)

    Google Scholar 

  13. Ashley, P., Hilton, H., Vandenwauver, M.: Wired Versus Wireless Security. Internet: white paper/2002 (2002)

    Google Scholar 

  14. Harris, B., Hunt, R.: TCP/IP security threats and attack Methods. Computer communications 22(10), 885–897 (1999)

    Article  Google Scholar 

  15. Hunt, R.: Internet/Intranet firewall Security-policy, Architecture and transaction services. Computer Communications 21, 1107–1123 (1998)

    Article  Google Scholar 

  16. JesiekB.: InternetSecurity-Firewalls, and Internet, http://www.ee.mtu.edu/course/ee465/groupb/fwll.html

  17. Baker, R.H.: Network Security, 2nd edn. Tata. McGraw Hill, New York (1995)

    Google Scholar 

  18. IEEE Standard 802.11i / Draft 3.0. Draft Supplement to ISO/IEC 8802-11/1999(I) ANSI/IEEE Std802.11, (1999 edn.); Specification for Enhanced Security, pp. 5-6 (November 2002)

    Google Scholar 

  19. Rager, A.T.: WEPCrack Project Webpage. Retrieved May 9 (2003), http://sourceforge.net/projects/wepcrack/

  20. Mishra, A., Petroni, N.L., Payne, B.D.: Open1x – Open Source Implementation of IEEE 802.1x, June (2003), http://www.open1x.org/

  21. Convery, S., Miller, D.: SAFE: Wireless LAN Security in Depth, version 2. White paper.Cisco Systems, Inc. (2003), http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safwl_wp.pdf

  22. Microsoft. (2002). Wireless 802.11 Security with Windows XP. Microsoft. http://www.microsoft.com//windowsxp/pro/techinfo/administration/wirelesssecurity/XP80211 Security.doc

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nayak, D., Phatak, D.B., Gulati, V.P. (2005). Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2005. Lecture Notes in Computer Science, vol 3439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31979-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31979-5_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25584-0

  • Online ISBN: 978-3-540-31979-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics