A performance analysis of the spring protocol through simulation

  • Authors:
  • Kevin Richardson;John A. Hamilton, Jr.;Martin C. Carlisle

  • Affiliations:
  • Auburn University;Auburn University;United States Air Force Academy

  • Venue:
  • SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many of today's organizations have set up wireless networks for company use, some merely for the convenience of not having wires everywhere. In addition, many of these networks are using a hardware implementation of the IEEE 802.11 Wired Equivalent Privacy protocol (WEP) for security. With the known vulnerabilities in WEP, these organizations are faced with either a costly hardware upgrade or just ignoring the vulnerabilities. However, the Synchronized Pseudo Random Number Generation protocol (SPRiNG) is a proposed solution to securing wireless communication designed to work with existing WEP enabled hardware devices. Replacing networking components with hardware that implements other security measures such as the Wi-Fi Protected Access protocol (WPA) can be very costly. Therefore, a solution such as SPRiNG that can be implemented with a software or a firmware upgrade on existing WEP enabled hardware is desirable. Using simulation, this paper provides a performance analysis of the SPRiNG protocol's increased overhead. We determine that SPRiNG will perform acceptably with up to 20% more than normal network loss.