An experimental study of cross-layer security protocols in public access wireless networks

被引:0
|
作者
Agarwal, AK [1 ]
Wang, WY [1 ]
McNair, JY [1 ]
机构
[1] N Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC 27695 USA
关键词
wireless networks; security policies; authentication time; cryptographic cost;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless networks require strong security mechanisms due to their open medium. However, security effects system performance, and therefore impacts quality of service (QoS) of communications. To analyze the impact of security on system performance, we conduct a detailed experimental study on a wireless IP testbed with security at different layers. We study their impact on different types of data streams such as TCP and UDP with regard to authentication time and cryptographic overhead. Specifically, we experiment with the most widely used security protocols such as WEP, IPsec, 802.1x with RADIUS, and SSL. We classify security protocols into individual and hybrid policies. Then, a new metric, relative security index, is introduced to analyze security strength and overhead tradeoffs quantitatively. Our results demonstrate that the stronger the security, the more signaling and delay overhead; whereas, the overhead does not necessarily increase monotonically with the security strength. Also, we notice that authentication time is a more significant factor than cryptographic cost regarding their contributions towards QoS degradation in wireless networks.
引用
收藏
页码:1747 / 1751
页数:5
相关论文
共 50 条
  • [1] Cross-layer design for the security of wireless sensor networks
    Xiao, Mingbo
    Wang, Xudong
    Yang, Guangsong
    [J]. WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 104 - +
  • [2] Cross-layer optimization of transport protocols over wireless networks
    Swami, Yogesh
    Le, Khiem
    Maheshwari, Shashikant
    Kakani, Naveen
    [J]. 2008 3RD INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, VOLS 1-2, 2008, : 241 - +
  • [3] New media access protocols for wireless ad hoc networks based on cross-layer principles
    Toumpis, Stavros
    Goldsmith, Andrea J.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (08) : 2228 - 2241
  • [4] Performance, optimization, and cross-layer design of media access protocols for wireless ad hoc networks
    Tournpis, S
    Goldsmith, AJ
    [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 2234 - 2240
  • [5] Cross-Layer Design of Wireless Multihop Random Access Networks
    Mardani, Morteza
    Kim, Seung-Jun
    Giannakis, Georgios B.
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (05) : 2562 - 2574
  • [6] IMPACT - A family of cross-layer transmission protocols for wireless sensor networks
    Brzozowski, Marcin
    Karnapke, Reinhardt
    Nolte, Joerg
    [J]. 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 619 - +
  • [7] Cross-layer Wireless Information Security
    Song, Lixing
    Wu, Shaoen
    [J]. 2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [8] Exploring cross-layer techniques for security: Challenges and opportunities in wireless networks
    Thamilarasu, Geethapriya
    Sridhar, Ramalingain
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3208 - 3213
  • [9] A Cross-layer Approach to Enhance the Security of Wireless Networks Based on MIMO
    Wen, Hong
    Gong, Guang
    [J]. 2009 43RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2009, : 935 - 939
  • [10] XLSEC - A Distributed Cross-layer Framework for Security in Wireless Sensor Networks
    Thamilarasu, G.
    Sridhar, R.
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 286 - 287