On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility

被引:0
作者
Avesh K. Agarwal
Wenye Wang
机构
[1] North Carolina State University,Department of Electrical and Computer Engineering
来源
Mobile Networks and Applications | 2007年 / 12卷
关键词
wireless local area networks; quality of service; quality of protection; security protocols; mobile IP; performance analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless local area networks (LANs) are vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications even at the cost of quality of service (QoS). However, there is very little work on investigating to what extent system performance is affected by security configurations with respect to mobility scenarios, heterogeneous networks, and different applications. In order to exploit the full potential of existing security solutions, we present a detailed experimental study to demonstrate the impacts of security features on performance by integrating cross-layer security protocols in a wireless LAN testbed with IP mobility. We introduce a quality of protection (QoP) model to indicate the benefits of security protocols and then measure the performance cost of security protocols in terms of authentication time, cryptographic overhead and throughput. Our measurements demonstrate that the effects of security protocols on QoS parameters span a wide range; for example, authentication time is between 0.11 and 6.28 s, which can potentially affect packet loss dramatically. We also find that for the same security protocol throughput in non-roaming scenarios can be up to two times higher than that in roaming scenarios. However, some protocols are robust against mobility with little variation in system performance; thus, it is possible to provision steady service by choosing security protocols when users’ mobility pattern is unknown. Furthermore, we provide observations on cross-layer security protocols and suggestions to the design of future security protocols for real-time services in wireless LANs.
引用
收藏
页码:93 / 110
页数:17
相关论文
共 20 条
[1]  
Hannikainen M(2002)Trends in personal wireless data communications Comput Commun 25 84-99
[2]  
Damalainen TD(2005)An efficient quality of service routing algorithm for delay-sensitive aplications Comput Networks 47 87-104
[3]  
Niemi M(2004)Security performance of loaded IEEE 802.11b wireless networks Elsevier Comput Commun 27 1746-1756
[4]  
Saarinen J(2002)Your 802.11 wireless network has no clothes IEEE Wirel Commun Mag 9 44-51
[5]  
Liu W(1998)Mobile networking through mobile IP IEEE Internet Computing 2 58-69
[6]  
Lou W(2004)Dynamic hierarchical mobility management strategy for mobile IP networks IEEE J Sel Areas Commun (Special Issue on All-IP Wireless Networks) 22 664-676
[7]  
Fang Y(2003)Access control with IBM tivoli access manager ACM Trans Inf Syst Secur (TISSEC) 6 232-257
[8]  
Baghaei N(2005)How well can the IEEE 802.11 wireless LAN support quality of service? IEEE Trans Wirel Commun 4 3084-3094
[9]  
Hunt R(undefined)undefined undefined undefined undefined-undefined
[10]  
Arbaugh WA(undefined)undefined undefined undefined undefined-undefined