Internet cryptography
Cryptographic security Techniques for wireless networks
ACM SIGOPS Operating Systems Review
Optimization of the Establishment of Secure Communication Channels in Wireless Mobile Networks
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Security Issues in Mobile Ecommerce
DEXA '00 Proceedings of the 11th International Workshop on Database and Expert Systems Applications
Achieving user privacy in mobile networks
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Preserving privacy in a network of mobile computers
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Tutorial: Internet/Intranet firewall security-policy, architecture and transaction services
Computer Communications
Review: TCP/IP security threats and attack methods
Computer Communications
A survey of security issues in multicast communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper, we investigated existing and proposed WLAN security technologies designed to improve 802.11 standard. Security concerns over WLAN vulnerabilities are explored, and associated techniques are provided to mitigate these vulnerabilities. We also analyzed the existing architecture types of AAA integrated network security solutions, 802.1X and VPNs. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN testbed architecture. We found that TCP and UDP traffic behaves erratically, when security index changes causing drastically degradation of system performance. In this paper, we present a detail study of performance overhead caused by the most widely used security protocols such as WEP, IPSEC VPN and 801.1X. Furthermore, we analyze the effectiveness of such solution, based on measurement of security indexing model implementation. Performance measurement indicates that 802.1X and VPN method can be used based on the service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users. General Terms: Mobile security, Wireless privacy, And port based Access point.