Modeling and evaluation of security architecture for wireless local area networks by indexing method: A novel approach

被引:0
作者
Nayak, D [1 ]
Phatak, DB
Gulati, VP
机构
[1] Indian Inst Technol Mumbai, Kanwal Rekhi Sch Informat Technol, Bombay 400076, Maharashtra, India
[2] Reserve Bank India, IDRBT, Hyderabad, Andhra Pradesh, India
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE | 2005年 / 3439卷
关键词
EAP; WPA; WVPN; WVLAN; 802.1X; security index;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we investigated existing and proposed WLAN security technologies designed to improve 802.11 standard. Security concerns over WLAN vulnerabilities are explored, and associated techniques are provided to mitigate these vulnerabilities. We also analyzed the existing architecture types of AAA integrated network security solutions, 802.1X and VPNs. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN testbed architecture. We found that TCP and UDP traffic behaves erratically, when security index changes causing drastically degradation of system performance. In this paper, we present a detail study of performance overhead caused by the most widely used security protocols such as WEP, IPSEC VPN and 801.1X. Furthermore, we analyze the effectiveness of such solution, based on measurement of security indexing model implementation. Performance measurement indicates that 802.1X and VPN method can be used based on the service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users.
引用
收藏
页码:25 / 35
页数:11
相关论文
共 22 条
[1]  
[Anonymous], NETWORK SECURITY
[2]  
ASHLEY P, 2002, WIRED VERSUS WIRELES
[3]   Achieving user privacy in mobile networks [J].
Askwith, B ;
Merabti, M ;
Shi, Q ;
Whiteley, K .
13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, :108-116
[4]  
Bharghavan V., 1995, Proceedings ISADS 95. Second International Symposium on Autonomous Decentralized Systems (Cat. No.95TH8073), P19, DOI 10.1109/ISADS.1995.398950
[5]  
CONVERY S, 2003, SAFE WIRELESS LAN SE
[6]  
COOPER DA, 1995, P IEEE S SECUR PRIV, P26, DOI 10.1109/SECPRI.1995.398920
[7]   TCP IP security threats and attack methods [J].
Harris, B ;
Hunt, R .
COMPUTER COMMUNICATIONS, 1999, 22 (10) :885-897
[8]   Internet/Intranet firewall security - policy, architecture and transaction services [J].
Hunt, R .
COMPUTER COMMUNICATIONS, 1998, 21 (13) :1107-1123
[9]  
*IEEE, 2002, 80211I ANSIIEEE, P5
[10]  
JESIEK B, INTERNET SECURITY FI