Академический Документы
Профессиональный Документы
Культура Документы
1,4
I. I NTRODUCTION
The market for wireless communications has made incredible growth during the past few years. Business and
the computer industry have an important place in Wireless
technologies [1]. Flexibility and mobility are the major benets
of wireless technologies. In wireless network data can be easily
accessed from anywhere because there is no headache of wires,
as in case of Wired Network [2]. The medium of transmission
in wireless communication is air, it makes the data insecure. So
security is very important issue in this sense because insecure
data cause a great loss for organizations. Several security
algorithms have been discovered to solve the IEEE 802.11
security issues. Performance reduction is the drawback of these
security algorithms. Effect of these algorithms is being studying [3]. This research unveils and compares the effects of WEP,
802.11x, and WPA on 802.11g wireless network performance.
In this search we used trafc type, transmission power and
security mechanisms as metrics to analyze the performance
of wireless network. The experiments are conducted using a
simple topology in a clean environment proving that 802.11g
wireless network. The rest of paper is organized as follows. In
section II, we discuss the related work. Section III describes
the experimental setup. Performance evaluation methodology
is explained in section IV. The results obtained are described
in section V. Further we present our conclusion and discuss
future work in section VI.
II. R ELATED W ORK
Wang et al [4] analyzed the impact of security on system
performance. Results demonstrated that the stronger the security, the more signaling and delay overhead. It was observed
that authentication time contributes more towards QoS degradation than cryptographic cost. Hunt et al [2] used multiple
clients to investigate the performance and security issues of
978-1-4673-4450-0/12/$31.00 2012 IEEE
TCP trafc types, UDP & TCP packet / window sizes, and
the transmit power of AP. Trafc is generated by using Iperf
as shown in Table-II & Table-III and then results are analyzed
using SPSS the statistical analysis tool. Performance metrics
considered here are Throughput in Mbits/sec and Response
time in seconds. We used 15 different security mechanisms as
shown in Table-I to check the impact of security protocols on
the performance of TCP & UDP. First in case of TCP, total
data sent is kept constant i.e. 15 M while the window size
is changed to 1K, 500K and 1000K. Then in case of UDP,
packet size is changed between 300 bytes, 600 bytes and 900
bytes keeping window size constant to 500K.
TABLE I
S ECURITY M ECHANISMS
Security Mechanisms
No security with SSID
MAC address authentication
Open System Authentication with 64-bit WEP Encryption
Open System Authentication with 128-bit WEP Encryption
Open System Authentication with 152-bit WEP Encryption
Shared Key Authentication with 64-bit WEP Encryption
Shared Key Authentication with 128-bit WEP Encryption
Shared Key Authentication with 152-bit WEP Encryption
Open System / Shared Key Authentication with 64-bit WEP Encryption
Open System/ Shared Key Authentication with 128-bit WEP Encryption
Open System / Shared Key Authentication with 152-bit WEP Encryption
WPA-PSK Authentication with AES Encryption
WPA-PSK Authentication with TKIP Encryption
WPA-EAP-PEAP Authentication with AES Encryption
WPA-EAP-PEAP Authentication with TKIP Encryption
Fig. 1.
1K
500K
1000K
500K u b 54M l 300
500K u b 54M l 600
500K u b 54M l 900
Fig. 2.
Fig. 4.
Fig. 7.
Fig. 8.
Fig. 11.
Fig. 9.
Fig. 10.
Fig. 12.
Fig. 13.
Fig. 14.
Fig. 15.
Fig. 16.
Fig. 17.
Fig. 18.