Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit
IEEE/ACM Transactions on Networking (TON)
A capacity analysis for the IEEE 802.11 MAC protocol
Wireless Networks
Opportunistic media access for multirate ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols
ACM SIGMOBILE Mobile Computing and Communications Review
EBA: An Enhancement of the IEEE 802.11 DCF via Distributed Reservation
IEEE Transactions on Mobile Computing
A Wireless MAC Protocol Using Implicit Pipelining
IEEE Transactions on Mobile Computing
A New MAC Scheme for Very High-Speed WLANs
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Efficient MAC strategies for the IEEE 802.11n wireless LANs: Research Articles
Wireless Communications & Mobile Computing
IEEE Transactions on Parallel and Distributed Systems
MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks
International Journal of Wireless and Mobile Computing
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
International Journal of Wireless and Mobile Computing
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
International Journal of Security and Networks
Priority-based opportunistic MAC protocol in IEEE 802.11 WLANs
International Journal of Sensor Networks
Securing Wi-Fi networks with position verification: extended version
International Journal of Security and Networks
On pairwise connectivity of wireless multihop networks
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Aggregation with fragment retransmission for very high-speed WLANs
IEEE/ACM Transactions on Networking (TON)
Using link RTT to passively detect unapproved wireless nodes
International Journal of Security and Networks
Flow-net methodology for accountability in wireless networks
IEEE Network: The Magazine of Global Internetworking
IEEE 802.11n: enhancements for higher throughput in wireless LANs
IEEE Wireless Communications
IEEE 802.11n MAC frame aggregation mechanisms for next-generation high-throughput WLANs
IEEE Wireless Communications
Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs
IEEE Transactions on Wireless Communications
IEEE 802.11 performance enhancement via concatenation and piggyback mechanisms
IEEE Transactions on Wireless Communications
Optimization between AES security and performance for IEEE 802.15.3 WPAN
IEEE Transactions on Wireless Communications
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
IEEE Communications Magazine
CSMA/CA performance under high traffic conditions: throughput and delay analysis
Computer Communications
Performance analysis of the IEEE 802.11 distributed coordination function
IEEE Journal on Selected Areas in Communications
International Journal of Sensor Networks
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
Aggregation and probabilistic verification for data authentication in VANETs
Information Sciences: an International Journal
Hi-index | 0.01 |
In this paper, we study the overhead introduced by the advanced encryption standard cipher in the context of wireless LANs, specifically at the medium access control layer, as described in the 802.11 standard developed by the 802.11n task group. The advanced encryption standard is incorporated into existing aggregation schemes for 802.11 wireless LANs in order to achieve secure transmission of frames. We compute the maximum throughput, optimal frame, and fragment sizes which can be achieved in this context and compare them to the optimal values when encryption is not used. We evaluate the delay performance of such a scheme in the context of encryption and study asymptotic properties of the medium access control layer efficiency, expected frame size, and throughput.