CFP last date
20 May 2024
Reseach Article

Impact of New Highly Secure Scheme on Wireless Network 802.11 Performance

by Brijesh Singh Yadav, Parul Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 7
Year of Publication: 2012
Authors: Brijesh Singh Yadav, Parul Yadav
10.5120/8056-1403

Brijesh Singh Yadav, Parul Yadav . Impact of New Highly Secure Scheme on Wireless Network 802.11 Performance. International Journal of Computer Applications. 51, 7 ( August 2012), 31-36. DOI=10.5120/8056-1403

@article{ 10.5120/8056-1403,
author = { Brijesh Singh Yadav, Parul Yadav },
title = { Impact of New Highly Secure Scheme on Wireless Network 802.11 Performance },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 7 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 31-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number7/8056-1403/ },
doi = { 10.5120/8056-1403 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:49:47.928634+05:30
%A Brijesh Singh Yadav
%A Parul Yadav
%T Impact of New Highly Secure Scheme on Wireless Network 802.11 Performance
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 7
%P 31-36
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless local area networks (WLAN) are beginning to play a much larger role in corporate network environments and are already very popular for home networking applications. This increase in accessibility has created large security holes for hackers and thieves to abuse, that is finally being addressed by stronger security protocols and these security protocols include Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802. 11i (WPA2). In this paper, we investigate the performance of wireless local area networks (WLANs) and security protocols available for WLANs. These existing security protocols have certain vulnerabilities and often hamper network performance as maintain poor trade-off between security and overhead on network performance. Here we propose our security protocol Slot Based Security Scheme (SBSS) in wireless local area network. Our proposed security protocol SBSS drastically increases the security and incurs almost same overhead on network performance as other existing security protocols in WLANs. We also develop our simulator in c++ to examine the impacts of these existing security protocols and our proposed protocol SBSS in WLANs on network performance that proves that our proposed scheme SBSS is much more efficient than existing security protocols in WLANs as SBSS maintains good trade-off between security and its associated overhead incurred on network performance.

References
  1. Wi-Fi Alliance. "Wi-Fi Protected Access (WPA) version 3. 1". August 2004.
  2. A. Mishra and W. Arbaugh, "An Initial Security Analysis of the IEEE 802. 1X Standard", http://www. cs. umd. edu/~waa/1x. pdf, February 2002
  3. Issues in Wireless Security (WEP, WPA & 802. 11i) Presented to the 18 th Annual Computer Security Applications Conference 11 December 2002 Brian R. Miller, Booz Allen Hamilton
  4. Introduction to 802. 1X for Wireless Local Area Networks, 2002, Interlink Networks www. interlinknetworks. com
  5. WPA: A Key Step Forward in Enterpriser-class Wireless LAN (WLAN) Security, Jon A. LaRosa, MeetingHouse data communications, 2003
  6. Wi-Fi Protected Access: Strong, standards-based, interoperable security for today's Wi-Fi networks, Wi-Fi Alliance, 2003 www. weca. net5
  7. 802. 11 Security Series Part II: The Temporal Key Integrity Protocol (TKIP), Jesse Walker, Intel Corporation, 2002
  8. The evolution of wireless security in 802. 11 networks: WEP, WPA and 802. 11 standards Stanley Wong GSEC Practical v1. 4b, 2003
  9. J. Daemen and V. Rijmen "AES Proposal: Rijndael," 1998.
  10. NEW PROTOCOL DESIGN FOR WIRELESS NETWORKS SECURITY Prof. Dr. Gamal Selim, Cairo, Egypt
  11. IEEE Standards Association, IEEE 802. 11 speci_cations. Technical speci_cations, 1999-2004. http://standards. ieee. org/getieee802/802. 11. html
  12. S. Gayal and S. A. Vetha Manickam, Wireless LAN Security Today and Tomorrow. Pune, India: Center for Information and Network Security, Pune University, 2002.
  13. IEEE 802. 11 Working Group, Task Group I IEEE 802. 11 Wireless LAN Standards, 2004 [Online]. Available: http://grouper. ieee. org/groups/802/11
  14. B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. New York: Wiley, 1996, pp. 397–398.
  15. Original posting of RC4 Algorithm to Cypherpunks mailing list 2006 [Online]. Available: http:// cypherpunks. venona. com/archive/1994/09/msg00304. html
  16. AES (Rijndael) Specification and Information National Institute of Standards and Technology, Boulder, CO, 2004 [Online]. Available:http://csrc. nist. gov/encryption/aes/rijndael
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Network Security Encryption Overhead RC4 AES TKIP