Skip to main content
Erschienen in: Journal of Network and Systems Management 1/2017

12.05.2016

Security-Performance Tradeoffs in a Class of Wireless Network Scenarios

verfasst von: Poonam Jindal, Brahmjit Singh

Erschienen in: Journal of Network and Systems Management | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

There has been an extensive and widespread deployment of wireless local area networks (WLANs) for information access. The transmission, being of a broadcast nature, is vulnerable to security threats and hence, the aspect of security provisioning in these networks has assumed an important dimension. The security of the transmitted data over a wireless channel aims at protecting the data from unauthorized access. The objective is achieved by providing advanced security mechanisms. Implementing strong security mechanisms however, affects the throughput performance and increases the complexity of the communication system. In this paper, we investigate the security performance of a WLAN based on IEEE 802.11b/g/n standards on an experimental testbed in congested and uncongested networks in a single and multi-client environment. Experimental results are obtained for a layered security model encompassing nine security protocols in terms of throughput, response time, and encryption overhead. The performance impact of transmission control protocol and user datagram protocol traffic streams on secure wireless networks has also been studied. Through numerical results obtained from the testbed, we have presented quantitative and realistic findings for both security mechanisms as well as network performance. The tradeoff between the strength of the security protocol and the associated performance is analyzed through computer simulation results. The present real time analysis enables the network designers to make intelligent choices about the implementation of security features and the perceived network performance for a given application scenario.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Sheldon, F.T., Weber, J.M., Yoo, S.M., Pan, W.D.: The insecurity of wireless networks. Secur. Priv. IEEE 10(4), 54–61 (2012)CrossRef Sheldon, F.T., Weber, J.M., Yoo, S.M., Pan, W.D.: The insecurity of wireless networks. Secur. Priv. IEEE 10(4), 54–61 (2012)CrossRef
2.
Zurück zum Zitat Feng, P.: Wireless LAN security issues and solutions. In: 2012 IEEE Symposium on Robotics and Applications (ISRA), pp. 921–924 (June 2012) Feng, P.: Wireless LAN security issues and solutions. In: 2012 IEEE Symposium on Robotics and Applications (ISRA), pp. 921–924 (June 2012)
3.
Zurück zum Zitat Ma, D., Tsudik, G.: Security and privacy in emerging wireless networks. Wirel. Commun. IEEE 17(5), 12–21 (2010)CrossRef Ma, D., Tsudik, G.: Security and privacy in emerging wireless networks. Wirel. Commun. IEEE 17(5), 12–21 (2010)CrossRef
4.
Zurück zum Zitat William, S.: Cryptography and Network Security, 4/E. Pearson Education India, Englewood Cliffs, NJ (2006) William, S.: Cryptography and Network Security, 4/E. Pearson Education India, Englewood Cliffs, NJ (2006)
5.
Zurück zum Zitat Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mob. Comput. 5(2), 128–143 (2006)CrossRef Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mob. Comput. 5(2), 128–143 (2006)CrossRef
6.
Zurück zum Zitat Jindal, P., Singh, B.: Performance evaluation of security-throughput tradeoff with channel adaptive encryption. Int. J. Comput. Netw. Inf. Secur. 5(1), 49 (2013) Jindal, P., Singh, B.: Performance evaluation of security-throughput tradeoff with channel adaptive encryption. Int. J. Comput. Netw. Inf. Secur. 5(1), 49 (2013)
7.
Zurück zum Zitat Wei, S., Wang, J., Yin, R., Yuan, J.: Trade-off between security and performance in block ciphered systems with erroneous ciphertexts. IEEE Trans. Inf. Forens. Secur. 8(4), 636–645 (2013)CrossRef Wei, S., Wang, J., Yin, R., Yuan, J.: Trade-off between security and performance in block ciphered systems with erroneous ciphertexts. IEEE Trans. Inf. Forens. Secur. 8(4), 636–645 (2013)CrossRef
8.
Zurück zum Zitat Ahmad, M., Taj, S., Mustafa, T., Asri, M.: Performance analysis of wireless network with the impact of security mechanisms. In: 2012 International Conference on Emerging Technologies (ICET), pp. 1–6. IEEE (Oct 2012) Ahmad, M., Taj, S., Mustafa, T., Asri, M.: Performance analysis of wireless network with the impact of security mechanisms. In: 2012 International Conference on Emerging Technologies (ICET), pp. 1–6. IEEE (Oct 2012)
9.
Zurück zum Zitat Bhatia, V., Gupta, D., Sinha, H.P.: Impact of security algorithms on various performance metrics of wireless LAN. In: Proceedings of the World Congress on Engineering, vol. 2 (2013) Bhatia, V., Gupta, D., Sinha, H.P.: Impact of security algorithms on various performance metrics of wireless LAN. In: Proceedings of the World Congress on Engineering, vol. 2 (2013)
10.
Zurück zum Zitat Kolahi, S.S., Li, P., Argawe, M., Safdari, M.: WPA2 security-bandwith trade-off in 802.11 n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems. In: 2012 IEEE Symposium on Computers and Communications (ISCC), pp. 000575–000579. IEEE (July 2012) Kolahi, S.S., Li, P., Argawe, M., Safdari, M.: WPA2 security-bandwith trade-off in 802.11 n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems. In: 2012 IEEE Symposium on Computers and Communications (ISCC), pp. 000575–000579. IEEE (July 2012)
11.
Zurück zum Zitat Peteriya, P.K.: A pragmatic study on different stream ciphers and on different flavors of RC4 stream cipher. Int. J. Comput. Sci. Netw. Secur. 12(3), 37–42 (2012) Peteriya, P.K.: A pragmatic study on different stream ciphers and on different flavors of RC4 stream cipher. Int. J. Comput. Sci. Netw. Secur. 12(3), 37–42 (2012)
12.
Zurück zum Zitat Baghaei, N., Hunt, R.: Security performance of loaded IEEE 802.11 b wireless networks. Comput. Commun. 27(17), 1746–1756 (2004)CrossRef Baghaei, N., Hunt, R.: Security performance of loaded IEEE 802.11 b wireless networks. Comput. Commun. 27(17), 1746–1756 (2004)CrossRef
13.
Zurück zum Zitat Baghaei, N., Hunt, R.: IEEE 802.11 wireless LAN security performance using multi-clients. In: Proceedings 12th IEEE International Conference on Networks, 2004. (ICON 2004), vol. 1, pp. 299–303. IEEE (Nov 2004) Baghaei, N., Hunt, R.: IEEE 802.11 wireless LAN security performance using multi-clients. In: Proceedings 12th IEEE International Conference on Networks, 2004. (ICON 2004), vol. 1, pp. 299–303. IEEE (Nov 2004)
14.
Zurück zum Zitat Turab, N., Moldoveanu, F.: The impact of various security mechanisms on the WLAN performance. Ser. C 70(4), 21–36 (2008) Turab, N., Moldoveanu, F.: The impact of various security mechanisms on the WLAN performance. Ser. C 70(4), 21–36 (2008)
15.
Zurück zum Zitat Barka, E., Boulmalf, M.: Impact of encryption on the throughput of infrastructure WLAN IEEE 802.11g. In: Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, pp. 2691–2697. IEEE (Mar 2007) Barka, E., Boulmalf, M.: Impact of encryption on the throughput of infrastructure WLAN IEEE 802.11g. In: Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, pp. 2691–2697. IEEE (Mar 2007)
16.
Zurück zum Zitat Holt, A., Huang, C.Y.: 802.11 Wireless Networks: Security and Analysis. Springer Science & Business Media, Berlin (2010)CrossRefMATH Holt, A., Huang, C.Y.: 802.11 Wireless Networks: Security and Analysis. Springer Science & Business Media, Berlin (2010)CrossRefMATH
17.
Zurück zum Zitat Mitchell, C.H.J.C.: Security analysis and improvements for IEEE 802.11 i. In: The 12th Annual Network and Distributed System Security Symposium (NDSS’05) Stanford University, Stanford, pp. 90–110 (2005) Mitchell, C.H.J.C.: Security analysis and improvements for IEEE 802.11 i. In: The 12th Annual Network and Distributed System Security Symposium (NDSS’05) Stanford University, Stanford, pp. 90–110 (2005)
18.
Zurück zum Zitat Shue, C.A., Gupta, M., Myers, S.A.: IPsec: Performance analysis and enhancements. In: IEEE International Conference on Communications, 2007. ICC’07, pp. 1527–1532. IEEE (June 2007) Shue, C.A., Gupta, M., Myers, S.A.: IPsec: Performance analysis and enhancements. In: IEEE International Conference on Communications, 2007. ICC’07, pp. 1527–1532. IEEE (June 2007)
19.
Zurück zum Zitat El-Hajj, W.: The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures. Secur. Commun. Netw. 5(1), 113–124 (2012)CrossRef El-Hajj, W.: The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures. Secur. Commun. Netw. 5(1), 113–124 (2012)CrossRef
20.
Zurück zum Zitat Zhang, Q., Yu, Z., Li, R.: Security analysis and improvement of RADIUS server. Comput. Eng. 5, 051 (2007) Zhang, Q., Yu, Z., Li, R.: Security analysis and improvement of RADIUS server. Comput. Eng. 5, 051 (2007)
21.
Zurück zum Zitat Boulmalf, M., Barka, E., Lakas, A.: Analysis of the effect of security on data and voice traffic in WLAN. Comput. Commun. 30(11), 2468–2477 (2007)CrossRef Boulmalf, M., Barka, E., Lakas, A.: Analysis of the effect of security on data and voice traffic in WLAN. Comput. Commun. 30(11), 2468–2477 (2007)CrossRef
22.
Zurück zum Zitat Barka, E., Boulmalf, M.: On the impact of security on the performance of WLANs. J. Commun. 2(4), 10–17 (2007)CrossRef Barka, E., Boulmalf, M.: On the impact of security on the performance of WLANs. J. Commun. 2(4), 10–17 (2007)CrossRef
23.
Zurück zum Zitat Agarwal, A.K., Wang, W.: Measuring performance impact of security protocols in wireless local area networks. In: 2nd International Conference on Broadband Networks, 2005. BroadNets 2005, pp. 581–590. IEEE (Oct 2005) Agarwal, A.K., Wang, W.: Measuring performance impact of security protocols in wireless local area networks. In: 2nd International Conference on Broadband Networks, 2005. BroadNets 2005, pp. 581–590. IEEE (Oct 2005)
24.
Zurück zum Zitat Agarwal, A.K., Wang, W.: On the impact of quality of protection in wireless local area networks with IP mobility. Mob. Netw. Appl. 12(1), 93–110 (2007)CrossRef Agarwal, A.K., Wang, W.: On the impact of quality of protection in wireless local area networks with IP mobility. Mob. Netw. Appl. 12(1), 93–110 (2007)CrossRef
25.
Zurück zum Zitat Nayak, D., Phatak, D.B., Gulati, V.P.: Modeling and evaluation of security architecture for wireless local area networks by indexing method: a novel approach. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) Information Security Practice and Experience, pp. 25–35. Springer Berlin (2005) Nayak, D., Phatak, D.B., Gulati, V.P.: Modeling and evaluation of security architecture for wireless local area networks by indexing method: a novel approach. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) Information Security Practice and Experience, pp. 25–35. Springer Berlin (2005)
26.
Zurück zum Zitat Begh, G.R., Mir, A.H.: Quantification of the effect of security on performance in wireless LANs. In: 3rd International Conference on In Emerging Security Information, Systems and Technologies, 2009. SECURWARE’09, pp. 57–62. IEEE (2009) Begh, G.R., Mir, A.H.: Quantification of the effect of security on performance in wireless LANs. In: 3rd International Conference on In Emerging Security Information, Systems and Technologies, 2009. SECURWARE’09, pp. 57–62. IEEE (2009)
27.
Zurück zum Zitat Narayan, S., Feng, T., Xu, X., Ardham, S.: Network performance evaluation of wireless IEEE802. 11n encryption methods on Windows Vista and Windows Server 2008 operating systems. In: IFIP International Conference on Wireless and Optical Communications Networks, 2009. WOCN’09, pp. 1–5. IEEE (Apr 2009) Narayan, S., Feng, T., Xu, X., Ardham, S.: Network performance evaluation of wireless IEEE802. 11n encryption methods on Windows Vista and Windows Server 2008 operating systems. In: IFIP International Conference on Wireless and Optical Communications Networks, 2009. WOCN’09, pp. 1–5. IEEE (Apr 2009)
28.
Zurück zum Zitat Likhar, P., Yadav, R.S.: Securing IEEE 802.11 G WLAN using Open VPN and its impact analysis. arXiv preprint arXiv:1201.0428 (2012) Likhar, P., Yadav, R.S.: Securing IEEE 802.11 G WLAN using Open VPN and its impact analysis. arXiv preprint arXiv:​1201.​0428 (2012)
29.
Zurück zum Zitat Pandurang, R.M., Karia, D.C.: Performance measurement of WEP and WPA2 on WLAN using Open VPN. In: 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE), pp. 1–4. IEEE (Jan 2015) Pandurang, R.M., Karia, D.C.: Performance measurement of WEP and WPA2 on WLAN using Open VPN. In: 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE), pp. 1–4. IEEE (Jan 2015)
30.
Zurück zum Zitat Hayajneh, T., Khasawneh, S., Jamil, B., Itradat, A.: Analyzing the impact of security protocols on wireless LAN with multimedia applications. In: SECURWARE 2012, the 6th International Conference on Emerging Security Information, Systems and Technologies, pp. 169–172 (Aug 2012) Hayajneh, T., Khasawneh, S., Jamil, B., Itradat, A.: Analyzing the impact of security protocols on wireless LAN with multimedia applications. In: SECURWARE 2012, the 6th International Conference on Emerging Security Information, Systems and Technologies, pp. 169–172 (Aug 2012)
31.
Zurück zum Zitat Singh, U., Jindal, P.: Performance analysis of secure wireless local area network using test-bed. In: 2014 4th International Conference on Advanced Computing & Communication Technologies (ACCT), pp. 386–389. IEEE (Feb 2014) Singh, U., Jindal, P.: Performance analysis of secure wireless local area network using test-bed. In: 2014 4th International Conference on Advanced Computing & Communication Technologies (ACCT), pp. 386–389. IEEE (Feb 2014)
32.
Zurück zum Zitat Singh, U., Jindal, P.: Impact of transmission power on the performance of secure wireless local area network. In: 2014 Students Conference on Engineering and Systems (SCES), vol. 1–6 (28–30 May 2014). doi: 10.1109/SCES.2014.6880056 Singh, U., Jindal, P.: Impact of transmission power on the performance of secure wireless local area network. In: 2014 Students Conference on Engineering and Systems (SCES), vol. 1–6 (28–30 May 2014). doi: 10.​1109/​SCES.​2014.​6880056
33.
Zurück zum Zitat Jindal, P., Singh, B.: Experimental study to analyze the security performance in wireless LANs. Wirel. Pers. Commun. 83, 2085–2131 (2015)CrossRef Jindal, P., Singh, B.: Experimental study to analyze the security performance in wireless LANs. Wirel. Pers. Commun. 83, 2085–2131 (2015)CrossRef
34.
Zurück zum Zitat Vander Walt, D.: FreeRADIUS Beginner’s Guide. Packt Publishing Ltd (2011) Vander Walt, D.: FreeRADIUS Beginner’s Guide. Packt Publishing Ltd (2011)
35.
Zurück zum Zitat Ward, B.: The Book of VMware: The Complete Guide to VMware Workstation (1). No Starch Press, San Francisco (2002) Ward, B.: The Book of VMware: The Complete Guide to VMware Workstation (1). No Starch Press, San Francisco (2002)
38.
Zurück zum Zitat Haleem, M., Mathur, C.N., Chandramouli, R., Subbalakshmi, K.P.: Opportunistic encryption: a trade-off between security and throughput in wireless networks. IEEE Trans. Dependable Secure Comput. 4(4), 313–324 (2007)CrossRefMATH Haleem, M., Mathur, C.N., Chandramouli, R., Subbalakshmi, K.P.: Opportunistic encryption: a trade-off between security and throughput in wireless networks. IEEE Trans. Dependable Secure Comput. 4(4), 313–324 (2007)CrossRefMATH
39.
Zurück zum Zitat Cacheda, R.A., García, D.C., Cuevas, A., Castano, F.J.G., Sánchez, J.H., Koltsidas, G., Pantò, A.: QoS requirements for multimedia services. In: Giambene, G. (ed.) Resource Management in Satellite Networks, pp. 67–94. Springer, USS (2007) Cacheda, R.A., García, D.C., Cuevas, A., Castano, F.J.G., Sánchez, J.H., Koltsidas, G., Pantò, A.: QoS requirements for multimedia services. In: Giambene, G. (ed.) Resource Management in Satellite Networks, pp. 67–94. Springer, USS (2007)
Metadaten
Titel
Security-Performance Tradeoffs in a Class of Wireless Network Scenarios
verfasst von
Poonam Jindal
Brahmjit Singh
Publikationsdatum
12.05.2016
Verlag
Springer US
Erschienen in
Journal of Network and Systems Management / Ausgabe 1/2017
Print ISSN: 1064-7570
Elektronische ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-016-9384-x

Weitere Artikel der Ausgabe 1/2017

Journal of Network and Systems Management 1/2017 Zur Ausgabe