Skip to main content

On the Evaluation of a Secure Solution to Access 802.11 Networks

  • Conference paper
E-business and Telecommunication Networks (ICETE 2005)

Abstract

Despite offering the possibility to develop and distribute a new set of applications to its users, the widespread and unrestricted use of mobile computing depends on the provisioning of a secure network environment. Regarding the communication established from mobile devices such as PDAs (Personal Digital Assistants), one of the most currently used standards is the IEEE 802.11b, which presents known security flaws. To overcome them, some alternative setups are commonly deployed, based on link, network, transport or application-layer. In this paper we evaluate the impact on data reception rate and energy consumption of IPSec-based PDAs access to 802.11b (WiFi) wireless LANs. As a result of this work we identify the overhead imposed by the security mechanisms and the capacity of the device to run CPU and network-intensive applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Crypto ip encapsulation (2004), http://www.extra300.nl

  • Linux frees/wan (2004), http://www.freeswan.org

  • Linux kernel archives (2004), http://www.kernel.org/

  • Openvpn (2004), http://openvpn.sourceforge.net

  • Secure electronic transaction (2004), http://www.setco.org

  • Virtual tunnels over tcp/ip networks (2004), http://vtun.sourceforge.net

  • Cam-Winget, N., Housley, R., Wagner, D., Walker, J.: Security flaws in 802.11 data link protocols. Communications of the ACM (2003)

    Google Scholar 

  • Freier, A.O., Karlton, P., Kocher, P.C.: The ssl protocol version 3.0. In: IETF Internet Draft (1996)

    Google Scholar 

  • Karri, R., Mishra, P.: Optimizing the energy consumed by secure wireless sessions: Wireless transport layer security case study. In: Mobile Networks and Applications (2003)

    Google Scholar 

  • Kent, S., Atkinson, R.: Security architecture for the internet protocol. In: IETF RFC 2401 (2004)

    Google Scholar 

  • Maciel, P., Nunes, B., Campos, C., Moraes, L.: Sobrecarga introduzida nas redes 802.11 pelos mecanismos de segurana wep e vpn/ipsec. In: 3rd Brazilian Workshop on Security of Computing Systems (2003)

    Google Scholar 

  • Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.: Analyzing the energy consumption of security protocols. In: Dept. of Electrical Engineering, Princeton University (2003)

    Google Scholar 

  • Stallings, W.: Network Security Essentials. Prentice Hall, Englewood Cliffs (2002)

    Google Scholar 

  • Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G., Palter, B.: Layer two tunneling protocol l2tp. In: IETF RFC 2661 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Joaquim Filipe Helder Coelhas Monica Saramago

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

da Costa, F., Gaspary, L., Barbosa, J., Cavalheiro, G., Pfitscher, L., Ramos, J.D.G. (2007). On the Evaluation of a Secure Solution to Access 802.11 Networks. In: Filipe, J., Coelhas, H., Saramago, M. (eds) E-business and Telecommunication Networks. ICETE 2005. Communications in Computer and Information Science, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75993-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75993-5_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75992-8

  • Online ISBN: 978-3-540-75993-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics