CFP last date
20 May 2024
Reseach Article

Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN

by Vinay Bhatia, Dushyant Gupta, H. P. Sinha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 52 - Number 3
Year of Publication: 2012
Authors: Vinay Bhatia, Dushyant Gupta, H. P. Sinha
10.5120/8182-1509

Vinay Bhatia, Dushyant Gupta, H. P. Sinha . Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN. International Journal of Computer Applications. 52, 3 ( August 2012), 21-26. DOI=10.5120/8182-1509

@article{ 10.5120/8182-1509,
author = { Vinay Bhatia, Dushyant Gupta, H. P. Sinha },
title = { Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 52 },
number = { 3 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 21-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume52/number3/8182-1509/ },
doi = { 10.5120/8182-1509 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:51:20.126235+05:30
%A Vinay Bhatia
%A Dushyant Gupta
%A H. P. Sinha
%T Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN
%J International Journal of Computer Applications
%@ 0975-8887
%V 52
%N 3
%P 21-26
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Recent years have shown an unprecedented growth in the use of wireless LANs. However unlike the relative simplicity of wired Ethernet deployments, IEEE 802. 11-based wireless LANs use radio-frequency (RF) data which is vulnerable to various attacks. This paper analyzes the IEEE 802. 11b wireless LANs to determine variations in throughput so as to compare it for different standards. In addition the throughput is compared with a new hypothetical standard which is based on IEEE 802. 11b. This paper also explores the vulnerability of these standards by simulating a popular attack on IEEE 802. 11b wireless LAN. The simulations are carried in NS2 which are used to compare the total time utilized for various simulated standards. To have an enhanced insight of vulnerability of wireless LAN average time per symbol is calculated for various standards and has also been compared. Finally, we have implemented these results to derive dependency of vulnerability on key size length by obtaining a graphical and mathematical relation among them.

References
  1. Kapp, S. 2002. 802. 11: leaving the wire behind. IEEE Journal on Internet Computing, Volume: 6, Issue: 1, Page(s): 82 – 85.
  2. Wool, A. 2004. A note on the fragility of the "Michael" message integrity code. IEEE Transactions on Wireless Communications, Volume: 3, Issue: 5, Page(s): 1459 - 1462.
  3. Guelzim, T. ; Obaidat, M. S. 2009. A new counter disassociation mechanism (CDM) for 802. 11b/g wireless local area networks. IEEE/ACS International Conference on Computer Systems and Applications, Page(s): 251 – 259.
  4. Arbaugh, W. A. ; Shankar, N. ; Wan, Y. C. J. ; Kan Zhang. 2002. Your 80211 wireless network has no clothes. IEEE Journal on Wireless Communications, Volume: 9, Issue: 6, Page(s): 44 – 51.
  5. Williams, J. 2001. The IEEE 802. 11b security problem. IEEE Journal IT Professional, Volume: 3, Issue: 6, Page(s): 96, 91 – 95.
  6. Pahlavan, K. ; Levesque, A. H. ; 1994. Wireless data communications. Proceedings of the IEEE. Volume: 82, Issue: 9, Page(s): 1398 – 1430.
  7. Fluhrer, S. R. , Mantin, I. & Shamir. A. 2001. Weaknesses in the Key Scheduling Algorithm of RC4. Selected Areas in Cryptography, Page(s):1–24.
  8. Jagetia, M. ; Kocak, T. 2004. A novel scrambling algorithm for a robust WEP implementation. IEEE 59th Vehicular Technology Conference Volume: 5, Page(s): 2487 – 2491.
  9. Songhe Zhao; Shoniregun, C. A. 2007. Critical Review of Unsecured WEP. IEEE Congress on Services, Page(s): 368 – 374.
  10. Steven Furnell and Bogdan Ghita. 2006. Usability pitfalls in Wireless LAN security Elsevier Journal Network Security, Issue 3, Pages 4-8.
  11. Delaune, S. ; Jacquemard, F. 2004. A theory of dictionary attacks and its complexity. IEEE 17th Computer Security Foundations Conference, Page(s): 2 – 15
  12. Vykopal, J. ; Plesnik, T. ; Minarik, P. 2009. Network-Based Dictionary Attack Detection. IEEE International Conference on Future Networks, Page(s): 23 – 27.
  13. Petroni, N. L. , Jr. ; Arbaugh, W. A. 2003. The dangers of mitigating security design flaws: a wireless case study. IEEE Journal on Security & Privacy, Volume: 1 , Issue: 1, Page(s): 28 – 36.
  14. Couture, N. ; Kent, K. B. 2004. The effectiveness of brute force attacks on RC4. Second Annual IEEE Conference on Communication Networks and Services Research, Page(s): 333 – 336.
  15. Seongyong Ahn; Hyejong Hong; Hyunjin Kim; Jin-Ho Ahn; Dongmyong Baek; Sungho Kang. 2009. A hardware-efficent multi-character string matching architecture using brute-force algorithm. International SoC Design Conference (ISOCC), Page(s): 464 – 467.
  16. Hwangnam Kim, Hou, J. C. 2004. Improving protocol capacity for UDP/TCP traffic with model-based frame scheduling in IEEE 802. 11-operated WLANs. IEEE Journal on Selected Areas in Communications, Volume: 22 , Issue: 10, Page(s): 1987 – 2003.
  17. Bononi, L. ; Conti, M. ; Gregori, E. 2004. Runtime optimization of IEEE 802. 11 wireless LANs performance. IEEE Transactions on Parallel and Distributed Systems, Volume: 15, Issue: 1, Page(s): 66 – 80.
Index Terms

Computer Science
Information Sciences

Keywords

TKIP WEP WLAN Wireless LAN