Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Build Your Own Wireless LAN
Network Security Fundamentals
VoIP: A comprehensive survey on a promising technology
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improving security information gathering with IEEE 802.21 to optimize handover performance
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Journal of Computer Systems, Networks, and Communications
Hi-index | 0.24 |
This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on the throughput and delay over WLAN IEEE 802.11g. Moreover, in this paper, we investigate the effect of encryption on the performance of wireless transmission during the handover process when a mobile device disassociates from one access point and re-associates with another one. In addition, this paper addresses the impact of the use of security in WLAN specifically on voice traffic namely the incurred transmission delay and jitter.