Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
DoS and authentication in wireless public access networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
802.11 Wireless Networks: The Definitive Guide
802.11 Wireless Networks: The Definitive Guide
Mobile Networking Through Mobile IP
IEEE Internet Computing
Access control with IBM Tivoli access manager
ACM Transactions on Information and System Security (TISSEC)
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
End-to-End Framework for QoS Guarantee in Heterogeneous Wired-cum-Wireless Networks
QSHINE '04 Proceedings of the First International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks
An efficient quality of service routing algorithm for delay-sensitive applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume I - Volume 01
Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume I - Volume 01
Quality of protection for mobile multimedia applications
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 1
Your 80211 wireless network has no clothes
IEEE Wireless Communications
How well can the IEEE 802.11 wireless LAN support quality of service?
IEEE Transactions on Wireless Communications
Security performance of loaded IEEE 802.11b wireless networks
Computer Communications
Tutorial: Trends in personal wireless data communications
Computer Communications
Dynamic hierarchical mobility management strategy for mobile IP networks
IEEE Journal on Selected Areas in Communications
Quality of protection analysis and performance modeling in IP multimedia subsystem
Computer Communications
Exploring the security requirements for quality of service in combined wired and wireless networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Evaluation of quality of protection adding HVM in wireless network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Optimization between security and delay of quality-of-service
Journal of Network and Computer Applications
Hi-index | 0.01 |
Wireless local area networks (LANs) are vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications even at the cost of quality of service (QoS). However, there is very little work on investigating to what extent system performance is affected by security configurations with respect to mobility scenarios, heterogeneous networks, and different applications. In order to exploit the full potential of existing security solutions, we present a detailed experimental study to demonstrate the impacts of security features on performance by integrating cross-layer security protocols in a wireless LAN testbed with IP mobility. We introduce a quality of protection (QoP) model to indicate the benefits of security protocols and then measure the performance cost of security protocols in terms of authentication time, cryptographic overhead and throughput. Our measurements demonstrate that the effects of security protocols on QoS parameters span a wide range; for example, authentication time is between 0.11 and 6.28 s, which can potentially affect packet loss dramatically. We also find that for the same security protocol throughput in nonroaming scenarios can be up to two times higher than that in roaming scenarios. However, some protocols are robust against mobility with little variation in system performance; thus, it is possible to provision steady service by choosing security protocols when users' mobility pattern is unknown. Furthermore, we provide observations on cross-layer security protocols and suggestions to the design of future security protocols for real-time services in wireless LANs.