Analysis of wireless network security for data transmission performance

被引:0
作者
Sawicki, Daniel [1 ]
Smyk, Sebastian [1 ]
机构
[1] Lublin Univ Technol, 38A Nadbystrzycka Str, PL-20618 Lublin, Poland
来源
PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2019 | 2019年 / 11176卷
关键词
wireless; security; transmission performance;
D O I
10.1117/12.2536848
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this work analysis of wireless network security for data transmission performance was performed. To carry out was chosen most currently popular wireless standards IEEE 802.11 family. Among the protocols used to secure local wireless networks, the most common protocols were selected. Four different test groups were tested, which tested the impact of wireless network security on: transfer depending on the network standard and frequency band for communication using TCP and UDP protocols, throughput depending on the size of the MTU parameter for communication using the TCP protocol, delay for communication using UDP protocol, delay depending on the type of data for communication using the UDP protocol. The best compromise between stability and network performance, and its protection is the standard IEEE 802.11n protected by WPA2 AES Enterprise version.
引用
收藏
页数:9
相关论文
共 11 条
[1]  
Agarwal A. K., 2005, 2005 2nd International Conference on Broadband Networks (Broadnets) (IEEE Cat. No. 05EX1116), P581
[2]  
Ahmadi M., 2012, IEEE ICET, P1
[3]  
Akram R.N., 2016, 2016 IEEEAIAA 35 DIG, P1
[4]  
Bilski Tomasz, 2016, Przeglad Elektrotechniczny, V92, P228, DOI 10.15199/48.2016.12.59
[5]  
Boukerche A., 2009, ALGORITHMS PROTOCOLS
[6]  
Derecka A., 2018, P SPIE, V10808
[7]   INFORMATION SECURITY TRADES IN TACTICAL WIRELESS NETWORKS [J].
Kurdziel, Michael T. ;
Alvermann, John A. .
MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2015, 2015, 9497
[8]  
Kurose James F., 2013, Computer networking: a topdown approach
[9]  
Oksiiuk O., 2019, INFORM AUTOMATYKA PO, V9, P53, DOI 10.5604/01.3001.0013.0921
[10]   Investigating End-to-End Security in the Fifth Generation Wireless Capabilities and IoT Extensions [J].
Uher, J. ;
Harper, J. ;
Mennecke, R. G., III ;
Patton, P. ;
Farroha, B. .
CYBER SENSING 2016, 2016, 9826