Title
Modeling and evaluation of security architecture for wireless local area networks by indexing method: a novel approach
Abstract
In this paper, we investigated existing and proposed WLAN security technologies designed to improve 802.11 standard. Security concerns over WLAN vulnerabilities are explored, and associated techniques are provided to mitigate these vulnerabilities. We also analyzed the existing architecture types of AAA integrated network security solutions, 802.1X and VPNs. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN testbed architecture. We found that TCP and UDP traffic behaves erratically, when security index changes causing drastically degradation of system performance. In this paper, we present a detail study of performance overhead caused by the most widely used security protocols such as WEP, IPSEC VPN and 801.1X. Furthermore, we analyze the effectiveness of such solution, based on measurement of security indexing model implementation. Performance measurement indicates that 802.1X and VPN method can be used based on the service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users. General Terms: Mobile security, Wireless privacy, And port based Access point.
Year
DOI
Venue
2005
10.1007/978-3-540-31979-5_3
ISPEC
Keywords
Field
DocType
security index change,mobile security,udp traffic,novel approach,wlan security technology,security concern,indexing method,wireless local area network,wlan vulnerability,proposed wlan testbed architecture,security indexing model implementation,security protocol,security architecture,aaa integrated network security,indexation,network security,system performance
IPsec,Computer science,Computer security,Network security,Network packet,Computer network,Security service,Transmission Control Protocol,Local area network,Enterprise information security architecture,Computer security model,Distributed computing
Conference
Volume
ISSN
ISBN
3439
0302-9743
3-540-25584-2
Citations 
PageRank 
References 
6
0.60
11
Authors
3
Name
Order
Citations
PageRank
Debabrata Nayak1111.91
D. B. Phatak271.30
V. P. Gulati325714.82