Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

An experimental study of cross-layer security protocols in public access wireless networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Agarwal, A.K. ; Dept. of Electr. & Comput. Eng., North Carolina State Univ., Raleigh, NC, USA ; Wenye Wang ; McNair, J.

Wireless networks require strong security mechanisms due to their open medium. However, security effects system performance, and therefore impacts quality of service (QoS) of communications. To analyze the impact of security on system performance, we conduct a detailed experimental study on a wireless IP testbed with security at different layers. We study their impact on different types of data streams such as TCP and UDP with regard to authentication time and cryptographic overhead. Specifically, we experiment with the most widely used security protocols such as WEP, IPsec, 802.1x with RADIUS, and SSL. We classify security protocols into individual and hybrid policies. Then, a new metric, relative security index, is introduced to analyze security strength and overhead tradeoffs quantitatively. Our results demonstrate that the stronger the security, the more signaling and delay overhead; whereas, the overhead does not necessarily increase monotonically with the security strength. Also, we notice that authentication time is a more significant factor than cryptographic cost regarding their contributions towards QoS degradation in wireless networks.

Published in:

Global Telecommunications Conference, 2005. GLOBECOM '05. IEEE  (Volume:3 )

Date of Conference:

28 Nov.-2 Dec. 2005