Measurement and Analysis of Handover Latencies in IEEE 802.11i Secured Networks

نویسندگان

  • Ivan Martinovic
  • Frank A. Zdarsky
  • Adam Bachorek
  • Jens B. Schmitt
چکیده

The purpose of the IEEE 802.11i standard is to endue wireless networks with advanced security by leveraging mature and proven security technologies. The concept of a Robust Secure Network (RSN) as a long-term security architecture was defined in order to provide confidentiality of data being transferred over the wireless medium as well as to provide mutual authentication between mobile stations and the network infrastructure. Nonetheless, security provisioning is indubitable time and resource consuming, which poses a problem as far as meeting quality of service demands of forthcoming delay-critical applications (e.g. Voice over WLAN) is concerned. The main objective of this research is to measure and analyze how currently deployed mobile devices perform when joining the RSN as defined by the IEEE 802.11i security amendment. Furthermore, we investigate various state-of-the-art implementations of IEEE 802.11i among different mobile devices providing the answer to what to expect on performance sacrifice by utilizing link-layer protection of IEEE 802.11i. As a result of this work, we find that the price to pay for the IEEE 802.11 security greatly varies among different devices, starting from low latencies such as ≈19 ms up to ≈330 ms and interestingly, computational stronger clients are not a priori the winners.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secured Route Optimization and Micro-mobility with Enhanced Handover Scheme in Mobile IPv6 Networks

خسارات وارد شده به شبکه گاز شهری در یک زلزله می­تواند زیان­های زیادی از جمله خسارت ناشی از آتش­سوزی در شبکه زیر ساخت، و خسارت ناشی از قطع خدمات رسانی، تعمیر و تعویض اعضای شبکه، را در بر داشته باشد. در این مقاله یک مدل آتش­سوزی پیشنهاد شده است. مدل پیشنهادی در یک مدل نیمه احتمالاتی مرسوم برای برآورد خسارت­های مختلف ناشی از آسیب دیدن شبکه گاز شهری، به کار برده شده است. هدف از این کار توسعه یک ابز...

متن کامل

Key Scheduling Scheme for Secured Routing in Wireless Adhoc Network

A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distribute...

متن کامل

Pre-Authentication Schemes for UMTS-WLAN Interworking

Interworking Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs) introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS) of t...

متن کامل

Secured Seamless Convergence across Heterogeneous Access Networks

Dual-mode handsets and multimode terminals are generating demand for solutions that enable convergence and seamless handover across heterogeneous access networks. The IEEE 802.21 working group is creating a framework that defines a Media Independent Handover Function (MIHF), facilitates the handover across heterogeneous access networks and help mobile users to experience a better performance du...

متن کامل

Distributed Authentication and Key Management in Wireless Mesh Networks

Authentication and Key Management (AKM) in Wireless Networks have been addressed in the IEEE 802.11i standard [10]. However, the IEEE 802.11s [21] Wireless Mesh Networks impose some further AKM requirements due to their large scale, distributed functionalities and decentralized authority. According to the IEEE 802.11s specifications, any security solutions should rely on IEEE 802.11i mechanisms...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007