Publication detail

Comparison of the WLANs security functions time consumption

KADLEC, J. KUCHTA, R. VRBA, R.

Original Title

Comparison of the WLANs security functions time consumption

English Title

Comparison of the WLANs security functions time consumption

Type

conference paper

Language

en

Original Abstract

Securing of the communication is the key parameter for all wireless networks. WLANs vulnerability to security threads is solved by several security mechanisms but all of these mechanisms have negative impact to the communication speed and final network performance. Time consumption of different security mechanisms used in wireless networks limits availability for several time-sensitive applications. This paper is focused on the performance tests of the WLAN IEEE 802.11g. New testbed for measuring of the basic network parameters with 10 ns resolution was developed and used for measuring influence of different security level which can be applied in IEEE 802.11g. Three main parameters of network communication in the wireless networks are bandwidth, delay and jitter. Knowing values of those three parameters allows us to decide if the WLANs parameters are acceptable for using in real-time applications or not. Based on the measured network dynamics we can select which real-time application is suitable for this wireless network. In our measuring we focused on the basic security mechanisms like WEP, WPA and WPA2.

English abstract

Securing of the communication is the key parameter for all wireless networks. WLANs vulnerability to security threads is solved by several security mechanisms but all of these mechanisms have negative impact to the communication speed and final network performance. Time consumption of different security mechanisms used in wireless networks limits availability for several time-sensitive applications. This paper is focused on the performance tests of the WLAN IEEE 802.11g. New testbed for measuring of the basic network parameters with 10 ns resolution was developed and used for measuring influence of different security level which can be applied in IEEE 802.11g. Three main parameters of network communication in the wireless networks are bandwidth, delay and jitter. Knowing values of those three parameters allows us to decide if the WLANs parameters are acceptable for using in real-time applications or not. Based on the measured network dynamics we can select which real-time application is suitable for this wireless network. In our measuring we focused on the basic security mechanisms like WEP, WPA and WPA2.

Keywords

Time consumption, security functions, WLAN

RIV year

2009

Released

13.12.2009

Publisher

IEEE Circuits and Systems Society

Location

Medina, Yasmine Hammamet - Tunisia

ISBN

978-1-4244-5091-6

Book

Proceedings of the 16th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2009, Tunisia, 13 to 16 December 2009

Pages from

141

Pages to

145

Pages count

4

Documents

BibTex


@inproceedings{BUT30359,
  author="Jaroslav {Kadlec} and Radek {Kuchta} and Radimír {Vrba}",
  title="Comparison of the WLANs security functions time consumption",
  annote="Securing of the communication is the key parameter for all wireless networks. WLANs vulnerability to security threads is solved by several security mechanisms but all of these mechanisms have negative impact to the communication speed and final network performance. Time consumption of different security mechanisms used in wireless networks limits availability for several time-sensitive applications. This paper is focused on the performance tests of the WLAN IEEE 802.11g. New testbed for measuring of the basic network parameters with 10 ns resolution was developed and used for measuring influence of different security level which can be applied in IEEE 802.11g. Three main parameters of network communication in the wireless networks are bandwidth, delay and jitter. Knowing values of those three parameters allows us to decide if the WLANs parameters are acceptable for using in real-time applications or not. Based on the measured network dynamics we can select which real-time application is suitable for this wireless network. In our measuring we focused on the basic security mechanisms like WEP, WPA and WPA2.",
  address="IEEE Circuits and Systems Society",
  booktitle="Proceedings of the 16th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2009, Tunisia, 13 to 16 December 2009",
  chapter="30359",
  howpublished="print",
  institution="IEEE Circuits and Systems Society",
  year="2009",
  month="december",
  pages="141--145",
  publisher="IEEE Circuits and Systems Society",
  type="conference paper"
}