Abstract
In this paper, we present a comprehensive experimental study to analyze the security performance of a WLAN based on IEEE 802.11b/g/n standards in a congested and uncongested roaming and non-roaming scenarios at different packet lengths. Experimental results are obtained for a layered security model encompassing nine security layers in terms of throughput, response time, and encryption overheads, packet loss, frame loss and jitter. The performance impact of TCP and UDP traffic streams on secure wireless networks has also been studied. Through numerical results obtained from the testbed, we have presented quantitative and realistic findings for both security mechanisms as well as network performance. It establishes the fact that there is always a tradeoff between the security strength and the associated network performance that is performance decreases with increase in security strength. It is observed that under all the network scenarios non-roaming network performs better than roaming network. To analyze the benefits offered by a particular security protocol we have presented a relative security strength index model. Further we have presented the statistical analysis of our experimental data. We found that different security protocols have different robustness against mobility. By choosing the robust security protocol, network performance can be improved. The present performance analysis is significant and useful with reference to the assessment of the suitability of security protocols for given real time application.



































Similar content being viewed by others
References
Ergen, M. (2002). IEEE 802.11 Tutorial. University of California Berkeley, 70.
Sheldon, F. T., Weber, J. M., Yoo, S. M., & Pan, W. D. (2012). The insecurity of wireless networks. Security & Privacy, IEEE, 10(4), 54–61.
Feng, P. (2012, June). Wireless LAN security issues and solutions. In 2012 IEEE symposium on robotics and applications (ISRA). IEEE, pp. 921–924.
Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K. (2006). A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing, 5(2), 128–143.
Jindal, P., & Singh, B. (2013). Performance evaluation of security-throughput tradeoff with channel adaptive encryption. International Journal of Computer Network & Information Security, 5(1), 49–55.
Baghaei, N., & Hunt, R. (2004) IEEE 802.11 wireless LAN security performance using multi-clients. In Proceedings of the 12th IEEE international conference on networks, vol. 1, pp. 299–303.
Turab, N., & Moldoveanu, F. (2008). The impact of various security mechanisms on the WLAN performance. Series C, 70(4), 21–36.
Boulmalf, M., Barka, E., & Lakas, A. (2007). Analysis of the effect of security on data and voice traffic in WLAN. Computer Communications, 30(11), 2468–2477.
Vibhuti, S. (2008). IEEE 802.11 WEP wired equivalent privacy concepts and vulnerability. Accessed on 29.
Lashkari, A. H., Danesh, M. M. S., & Samadi, B. (2009, August). A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In 2nd IEEE international conference on computer science and information technology, 2009. ICCSIT 2009. IEEE, pp. 48–52.
Peteriya, P. K. (2012). A pragmatic study on different stream ciphers and on different flavors of RC4 stream cipher. International Journal of Computer Science & Network Security, 12(3), 37–42.
Mitchell, C. H. J. C. (2005). Security analysis and improvements for IEEE 802.11i. In The 12th annual network and distributed system security symposium (NDSS’05) (pp. 90–110). Stanford University, Stanford.
Nayak, D., Phatak, D. B., & Gulati, V. P. (2005). Modeling and evaluation of security architecture for wireless local area networks by indexing method: A novel approach. In R. H. Deng, F. Bao, H. Pang & J. Zhou (Eds.), Information Security Practice and Eexperience, Proceedings of First International Conference, ISPEC 2005, Singapore, April 11–14, 2005 (pp. 25–35). Berlin, Heidelberg: Springer.
Begh, G. R., & Mir, A. H. (2009). Quantification of the effect of security on performance in wireless LANs. In The third international conference on emerging security information, systems and technologies. IEEE, pp. 57–62.
Hayajneh, T., Khasawneh, S., Jamil, B., & Itradat, A. (2012, August). Analyzing the impact of security protocols on wireless LAN with multimedia applications. In SECURWARE 2012, the sixth international conference on emerging security information, systems and technologies, pp. 169–172.
Ahmad, M., Taj, S., Mustafa, T., & Asri, M. (2012, October). Performance analysis of wireless network with the impact of security mechanisms. In 2012 International Conference on Emerging Technologies (ICET). IEEE, pp. 1–6.
Likhar, P., & Yadav, R. S. (2011). Securing IEEE 802.11g WLAN using open VPN and its impact analysis. International Journal of Network Security & Its Applications (IJNSA), 3(6), 97–113.
Bhatia, V., Gupta, D., & Sinha, H. P. (2013). Impact of security algorithms on various performance metrics of wireless LAN. In Proceedings of the world congress on engineering, vol. 2.
Agarwal, A. K., & Wang, W. (2007). On the impact of quality of protection in wireless local area networks with IP mobility. Mobile Networks and Applications, 12(1), 93–110.
Luo, A. A., Lin, C., Wang, K., Lei, L., & Liu, C. (2009). Quality of protection analysis and performance modeling in IP multimedia subsystem. Computer Communications, 32(11), 1336–1345.
Ethereal. http://www.ethereal.com/
IP traffic. www.zti-telecom.com/pages/iptraffic-test-measure.htm
RADIUS. http://www.freeradius.org
Holt, A., & Huang, C. Y. (2010). 802.11 wireless networks: Security and analysis. Berlin: Springer.
Chen, J., Zeng, H., Hu, C., & Ji, Z. (2011). Optimization between security and delay of quality-of-service. Journal of Network and Computer Applications, 34(2), 603–608.
Casola, V., Rak, M., Mazzeo, A., & Mazzoccca, N. (2005, April). Security design and evaluation in a VoIP secure infrastracture: A policy based approach. In ITCC 2005. International conference on information technology: Coding and computing, 2005 (vol. 1, pp. 727–732). IEEE.
Ong, C. S., Nahrstedt, K., & Yuan, W. (2003, July). Quality of protection for mobile multimedia applications. In 2003 International conference on multimedia and expo, 2003. ICME’03. Proceedings. (vol. 2, pp. II–137). IEEE.
http://www.intel.com/support/wireless/wlan/4965agn/sb/cs-025643.htm
Farkas, K., Wellnitz, O., Dick, M., Gu, X., Busse, M., Effelsberg, W., & Serpanos, D. N. (2006). Real-time service provisioning for mobile and wireless networks. Computer Communications, 29(5), 540–550.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jindal, P., Singh, B. Experimental Study to Analyze the Security Performance in Wireless LANs. Wireless Pers Commun 83, 2085–2131 (2015). https://doi.org/10.1007/s11277-015-2504-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2504-1