Abstract
Despite offering the possibility to develop and distribute a new set of applications to its users, the widespread and unrestricted use of mobile computing depends on the provisioning of a secure network environment. Regarding the communication established from mobile devices such as PDAs (Personal Digital Assistants), one of the most currently used standards is the IEEE 802.11b, which presents known security flaws. To overcome them, some alternative setups are commonly deployed, based on link, network, transport or application-layer. In this paper we evaluate the impact on data reception rate and energy consumption of IPSec-based PDAs access to 802.11b (WiFi) wireless LANs. As a result of this work we identify the overhead imposed by the security mechanisms and the capacity of the device to run CPU and network-intensive applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Crypto ip encapsulation (2004), http://www.extra300.nl
Linux frees/wan (2004), http://www.freeswan.org
Linux kernel archives (2004), http://www.kernel.org/
Openvpn (2004), http://openvpn.sourceforge.net
Secure electronic transaction (2004), http://www.setco.org
Virtual tunnels over tcp/ip networks (2004), http://vtun.sourceforge.net
Cam-Winget, N., Housley, R., Wagner, D., Walker, J.: Security flaws in 802.11 data link protocols. Communications of the ACM (2003)
Freier, A.O., Karlton, P., Kocher, P.C.: The ssl protocol version 3.0. In: IETF Internet Draft (1996)
Karri, R., Mishra, P.: Optimizing the energy consumed by secure wireless sessions: Wireless transport layer security case study. In: Mobile Networks and Applications (2003)
Kent, S., Atkinson, R.: Security architecture for the internet protocol. In: IETF RFC 2401 (2004)
Maciel, P., Nunes, B., Campos, C., Moraes, L.: Sobrecarga introduzida nas redes 802.11 pelos mecanismos de segurana wep e vpn/ipsec. In: 3rd Brazilian Workshop on Security of Computing Systems (2003)
Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.: Analyzing the energy consumption of security protocols. In: Dept. of Electrical Engineering, Princeton University (2003)
Stallings, W.: Network Security Essentials. Prentice Hall, Englewood Cliffs (2002)
Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G., Palter, B.: Layer two tunneling protocol l2tp. In: IETF RFC 2661 (1999)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
da Costa, F., Gaspary, L., Barbosa, J., Cavalheiro, G., Pfitscher, L., Ramos, J.D.G. (2007). On the Evaluation of a Secure Solution to Access 802.11 Networks. In: Filipe, J., Coelhas, H., Saramago, M. (eds) E-business and Telecommunication Networks. ICETE 2005. Communications in Computer and Information Science, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75993-5_19
Download citation
DOI: https://doi.org/10.1007/978-3-540-75993-5_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75992-8
Online ISBN: 978-3-540-75993-5
eBook Packages: Computer ScienceComputer Science (R0)