Skip to main content
Log in

Experimental Study to Analyze the Security Performance in Wireless LANs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we present a comprehensive experimental study to analyze the security performance of a WLAN based on IEEE 802.11b/g/n standards in a congested and uncongested roaming and non-roaming scenarios at different packet lengths. Experimental results are obtained for a layered security model encompassing nine security layers in terms of throughput, response time, and encryption overheads, packet loss, frame loss and jitter. The performance impact of TCP and UDP traffic streams on secure wireless networks has also been studied. Through numerical results obtained from the testbed, we have presented quantitative and realistic findings for both security mechanisms as well as network performance. It establishes the fact that there is always a tradeoff between the security strength and the associated network performance that is performance decreases with increase in security strength. It is observed that under all the network scenarios non-roaming network performs better than roaming network. To analyze the benefits offered by a particular security protocol we have presented a relative security strength index model. Further we have presented the statistical analysis of our experimental data. We found that different security protocols have different robustness against mobility. By choosing the robust security protocol, network performance can be improved. The present performance analysis is significant and useful with reference to the assessment of the suitability of security protocols for given real time application.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35

Similar content being viewed by others

References

  1. Ergen, M. (2002). IEEE 802.11 Tutorial. University of California Berkeley, 70.

  2. Sheldon, F. T., Weber, J. M., Yoo, S. M., & Pan, W. D. (2012). The insecurity of wireless networks. Security & Privacy, IEEE, 10(4), 54–61.

    Article  Google Scholar 

  3. Feng, P. (2012, June). Wireless LAN security issues and solutions. In 2012 IEEE symposium on robotics and applications (ISRA). IEEE, pp. 921–924.

  4. Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K. (2006). A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing, 5(2), 128–143.

    Article  Google Scholar 

  5. Jindal, P., & Singh, B. (2013). Performance evaluation of security-throughput tradeoff with channel adaptive encryption. International Journal of Computer Network & Information Security, 5(1), 49–55.

  6. Baghaei, N., & Hunt, R. (2004) IEEE 802.11 wireless LAN security performance using multi-clients. In Proceedings of the 12th IEEE international conference on networks, vol. 1, pp. 299–303.

  7. Turab, N., & Moldoveanu, F. (2008). The impact of various security mechanisms on the WLAN performance. Series C, 70(4), 21–36.

  8. Boulmalf, M., Barka, E., & Lakas, A. (2007). Analysis of the effect of security on data and voice traffic in WLAN. Computer Communications, 30(11), 2468–2477.

    Article  Google Scholar 

  9. Vibhuti, S. (2008). IEEE 802.11 WEP wired equivalent privacy concepts and vulnerability. Accessed on 29.

  10. Lashkari, A. H., Danesh, M. M. S., & Samadi, B. (2009, August). A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In 2nd IEEE international conference on computer science and information technology, 2009. ICCSIT 2009. IEEE, pp. 48–52.

  11. Peteriya, P. K. (2012). A pragmatic study on different stream ciphers and on different flavors of RC4 stream cipher. International Journal of Computer Science & Network Security, 12(3), 37–42.

  12. Mitchell, C. H. J. C. (2005). Security analysis and improvements for IEEE 802.11i. In The 12th annual network and distributed system security symposium (NDSS’05) (pp. 90–110). Stanford University, Stanford.

  13. Nayak, D., Phatak, D. B., & Gulati, V. P. (2005). Modeling and evaluation of security architecture for wireless local area networks by indexing method: A novel approach. In R. H. Deng, F. Bao, H. Pang & J. Zhou (Eds.), Information Security Practice and Eexperience, Proceedings of First International Conference, ISPEC 2005, Singapore, April 11–14, 2005 (pp. 25–35). Berlin, Heidelberg: Springer.

  14. Begh, G. R., & Mir, A. H. (2009). Quantification of the effect of security on performance in wireless LANs. In The third international conference on emerging security information, systems and technologies. IEEE, pp. 57–62.

  15. Hayajneh, T., Khasawneh, S., Jamil, B., & Itradat, A. (2012, August). Analyzing the impact of security protocols on wireless LAN with multimedia applications. In SECURWARE 2012, the sixth international conference on emerging security information, systems and technologies, pp. 169–172.

  16. Ahmad, M., Taj, S., Mustafa, T., & Asri, M. (2012, October). Performance analysis of wireless network with the impact of security mechanisms. In 2012 International Conference on Emerging Technologies (ICET). IEEE, pp. 1–6.

  17. Likhar, P., & Yadav, R. S. (2011). Securing IEEE 802.11g WLAN using open VPN and its impact analysis. International Journal of Network Security & Its Applications (IJNSA), 3(6), 97–113.

    Article  Google Scholar 

  18. Bhatia, V., Gupta, D., & Sinha, H. P. (2013). Impact of security algorithms on various performance metrics of wireless LAN. In Proceedings of the world congress on engineering, vol. 2.

  19. Agarwal, A. K., & Wang, W. (2007). On the impact of quality of protection in wireless local area networks with IP mobility. Mobile Networks and Applications, 12(1), 93–110.

    Article  MathSciNet  Google Scholar 

  20. Luo, A. A., Lin, C., Wang, K., Lei, L., & Liu, C. (2009). Quality of protection analysis and performance modeling in IP multimedia subsystem. Computer Communications, 32(11), 1336–1345.

    Article  Google Scholar 

  21. Ethereal. http://www.ethereal.com/

  22. IP traffic. www.zti-telecom.com/pages/iptraffic-test-measure.htm

  23. RADIUS. http://www.freeradius.org

  24. Holt, A., & Huang, C. Y. (2010). 802.11 wireless networks: Security and analysis. Berlin: Springer.

    Book  Google Scholar 

  25. Chen, J., Zeng, H., Hu, C., & Ji, Z. (2011). Optimization between security and delay of quality-of-service. Journal of Network and Computer Applications, 34(2), 603–608.

    Article  Google Scholar 

  26. Casola, V., Rak, M., Mazzeo, A., & Mazzoccca, N. (2005, April). Security design and evaluation in a VoIP secure infrastracture: A policy based approach. In ITCC 2005. International conference on information technology: Coding and computing, 2005 (vol. 1, pp. 727–732). IEEE.

  27. Ong, C. S., Nahrstedt, K., & Yuan, W. (2003, July). Quality of protection for mobile multimedia applications. In 2003 International conference on multimedia and expo, 2003. ICME’03. Proceedings. (vol. 2, pp. II–137). IEEE.

  28. https://learningnetwork.cisco.com

  29. http://www.intel.com/support/wireless/wlan/4965agn/sb/cs-025643.htm

  30. Farkas, K., Wellnitz, O., Dick, M., Gu, X., Busse, M., Effelsberg, W., & Serpanos, D. N. (2006). Real-time service provisioning for mobile and wireless networks. Computer Communications, 29(5), 540–550.

    Article  Google Scholar 

  31. www.minitab.com

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Poonam Jindal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jindal, P., Singh, B. Experimental Study to Analyze the Security Performance in Wireless LANs. Wireless Pers Commun 83, 2085–2131 (2015). https://doi.org/10.1007/s11277-015-2504-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2504-1

Keywords

Navigation