An Evaluation of Security Services schemes For IEEE Wireless LAN s Using Qualnet
|
|
|
- Domenic Gaines
- 10 years ago
- Views:
Transcription
1 An Evaluation of Security Services schemes For IEEE Wireless LAN s Using Qualnet Richa Gupta 1, Hamid Ali 2, munendra kumar das 3, Shalini Chaudhary 4 P.G. Student, Department of Electronics and Communication Engineering, Shobhit University, Meerut, India 1 Associate Professor, Department of Electronics and Communication Engineering, Shobhit University, Meerut, India 2 Assistant Professor, Department of Electrical Engineering, Dr. K N Modi Institute of, Modinagar, India 3 P.G. Student, Department of Electronics and Communication Engineering, Shobhit University, Meerut, India 4 ABSTRACT: In the era of information and communication technology, WLANs are being used for military, multimedia and health application, where high system performance and the ability to stay in link is extremely required. WLAN supports best-effort service at lower investment and cost. Apart from low cost,ieee technology is relatively easy, quick to install, and operating on a unlicensed frequency of 2.4 GHz which can be built independently by the individual or organization without reliance on operator. With the increasing demand and penetration of wireless services, users now expect good Quality of Services (QoS), in terms of delay; media access delay, throughput, and retransmission attempts. The author has studied the effect on Security by changing number of nodes, changing data rates and changing attacks. The effects of variation of these parameters on Throughput, Average Jitter, Average End to End Delay, Peak Queue Size and Average Queue Length have been studied Throughput of CCMP Security Protocol is more by 13.3% in comparison to WEP Security Protocol. In CCMP Average Jitter and Average End to End Delay are lesser by 7.4% and 10.24% respectively in comparison to WEP Security Protocol. This simply proved that CCMP Security Protocol is provides better security in comparison to WEP Security Protocol and remove the flaws of WEP Security Protocol. Wormhole Attack and Eavesdrop Attack badly affected the performance of IEEE WLANs. Throughput in wormhole attack reduces by 17% in comparison to eavesdrop attack. Average Jitter and Average End to End Delay reduces by 14% and 8% respectively in Eavesdrop Attack in comparison to Wormhole Attack. KEYWORDS: Quality of Service, wireless LANs, performance evaluation, MAC protocol. I. INTRODUCTION WLAN standard and security services is IEEE become top priority in installation of wireless technology-based information infrastructure because of its economic feasibility and high ability over several wireless technologies available today such as microwave, Wi-Fi or IEEE and Wi-MAX. Apart from the low cost, IEEE technology is relatively easy, quick to install, and operating on an unlicensed frequency of 2.4 GHz which can be built independently by the individual or organization without reliance on operator. A Wireless LAN always uses the electromagnetic waves to transmit the data signals from one end to another end in the network and it is implemented on the physical layer. IEEE wireless LAN has two types of network architectures: A) Ad-Hoc Network B) Infrastructure Network DOI: /IJIRSET
2 (a) (b) Figure 1: a) Ad-Hoc Network b) Infrastructure Network IEEE group started work on IEEE project in year 1997, in order to design a Medium Access Control (MAC) and Physical layer (PHY) which provides benefits to wireless connectivity to fixed stations, portable stations and moving station within the specific boundary of the network. The initial standard includes three Physical layers, FHSS (Frequency Hopping Spread Spectrum), DSSS (Direct Sequence Spread Spectrum) and Infrared. Later on two other transmission technologies were included OFDM (Orthogonal Frequency Division Multiplexing) and HR-DSSS (High Rate Direct Sequence Spread Spectrum). IEEE MAC layer consists of Channel Access Mechanism. IEEE MAC provides two channel access controls, DCF (Distributed Coordination Function) and PCF (Point Coordination Function). PCF provides contentionfree channel access and aims at supporting real-time traffic. DCF works based on CSMA/CA (Carrier- sense Multiple Access with Collision Avoidance) with the consideration of the complexity in wireless environment; for example, stations can not listen to the channel for collisions while transmitting. II. SECURITY IN IEEE NETWORKS The security solutions is a measure of network performance that reflects the network's transmission quality and service availability for IEEE standard like WEP, CCMP, etc and which one is considered to be best in which environment. 1. Wired Equivalent Privacy (WEP) WEP is a first security technique that is used in IEEE standards. The main purpose of using the WEP is to provide the security to WLAN like the wired LAN. WEP helps to make the communication secure and provide the secret authentication scheme between AP and the end user which is going to access the WLAN. Basically WEP implemented on initial Wifi networks so that the user can not access the network without the correct key. WEP uses symmetric key encryption that ranges from 64 to 128 bit long encryption key. Usually, the same encrypted key is used for all the nodes in the network and manually forwarded to each node means WEP is unable to provide the key management function. WEP is using the shared key authentication method in which the user needs two things in order to access the WLAN, one is SSID and second is WEP key generated by the AP. The IEEE standard defines the three different parameters for the WEP i.e. access control, data privacy and data integrity. 2. CCMP The CCMP is an encryption algorithm of IEEE i. CCMP performs in a particular mode of operation that is AES. In other words the mode of operation is known as the algorithm, whose purpose is to change the cipher text to plaintext and vice versa. The main purpose of using the encryption technique is to provide the confidentiality to data and hence it is proved that previous encryption technique is failed to provide the data integrity. In order to provide the integrity to data, a new message authentication code is appended with the original message. The message authentication code is useful for keyed cryptographic function in order to generate the integrity value (ICV). DOI: /IJIRSET
3 In IEEE i standard is divided the CCMP in to two parts: i] Counter mode CTR-Mode. The counter mode is used in AES to encrypt the data. ii] Cipher block chaining- MAC mode CBC-MAC Mode. CBC-MAC mode is used to create a MIC code that provides integrity to data. 3. Parameters Studied The following parameters were studied to compare the results obtained to determine the Security of IEEE Wireless Local Area networks under WEP and CCMP Security Protocols. (i) Throughput (bit/sec): The total number of bits (in bits/sec) sent to the higher layer from the MAC layer. The data packets received at the physical layer are sent to the higher layer if they are destined for this station. (ii) Average Jitter: Jitter is defined as a variation in the Delay of received packets. (iii) Average End-to-End Delay: It indicates the Length of time taken for a packet to travel from the CBR (Constant Bit Rate) source to the destination. It represents the total Delay between creation and reception of an application packet. III. SIMULATION SCENARIO In our work, we use QUALNET 5 to model a WLAN. We have taken three different scenarios to study the performance of WLAN. Scenario 1: Effect on Security by Changing Number of Nodes (a) (b) (c) Figure 2: (a) CBR Server Throughput comparison, (b) Average Jitter comparison, (c) Average End to End Delay comparison for No Security, WEP Security Protocol and CCMP Security Protocol Analysis of scenario 1 simulation results: 1. The values of CBR Server Throughput for no security, WEP and CCMP are , and bits/sec. respectively. As the number of nodes increases the Throughput constantly decreases. 2. Average Jitter for no security, WEP and CCMP are , and seconds respectively. As the number of nodes increases the Average Jitter increases. 3. Average End to End Delay for no security, WEP and CCMP are , and seconds respectively. As the number of nodes increases the Average End to End Delay constantly increases. DOI: /IJIRSET
4 Scenario 2: Effect on Security by Changing Data Rates (a) (b) (c) Figure3 (a) CBR Server Throughput comparison, (b)average Jitter comparison, (c) Average End to End Delay comparison, for No Security, WEP Security Protocol and CCMP Security Protocol Analysis of scenario 2 simulation results: 1. CBR Server Throughput for no security, WEP and CCMP are , and bits/sec respectively. Throughput is highest for the 11 Mbps and lowest for 2 Mbps. 2. Average Jitter for no security, WEP and CCMP are , and seconds respectively. Average Jitter is highest for the 2 Mbps and lowest for 11 Mbps. 3. Average End to End Delay for no security, WEP and CCMP are , and seconds respectively. Average End to End Delay is highest for the 2 Mbps and lowest for 11 Mbps. Scenario 3: Effect of Attacks on Security (a) (b) (c) Figure 4: (a) CBR Server Throughput comparison, (b) Average Jitter comparison, (c) Average End to End Delay comparison for No Security, WEP Security Protocol and CCMP Security Protocol DOI: /IJIRSET
5 Analysis of scenario 3 simulation results: 1. CBR Server Throughput for no security, WEP and CCMP in eavesdrop attack are , and bits/sec. respectively. The CCMP removes the flaws present in WEP and provides better security to wireless network. 2. Average Jitter value for no security, WEP and CCMP are , and seconds respectively. The Average Jitter reduces by 17.48% when WEP security protocol is used in Eavesdrop. 3. Average End to End Delay for no security, WEP and CCMP are , and seconds respectively. Average End to End Delay decreases by 8.69% in comparison WEP, When CCMP security protocol is used in Eavesdrop. IV. CONCLUSION The findings of the thesis work clearly states that, the implementation of such security mechanisms have a significant impact on the overall network through positively. On the other hand, the implementation of such protocols not only mitigates security related issues, it also increases the overall performance of our IEEE Wireless Networks. WEP Security Protocol and CCMP Security protocol which are provision security in IEEE networks provide adequate performance to secure IEEE Wireless Networks. Throughput of CCMP Security Protocol is more by 13.3% in comparison to WEP Security Protocol. In CCMP Average Jitter and Average End to End Delay are lesser by 7.4% and 10.24% respectively in comparison to WEP. This simply proved that CCMP is provides better security in comparison to WEP and remove the flaws of WEP. It is observed that as the number of nodes increases throughput decreases but values of Average Jitter and Average End to End Delay increase. So it can be concluded that it become difficult to provide security to the network as number of nodes increases. Increasing data rate reduces Average Jitter and Average End to End Delay because it take less time to transmit data from one node to another and increases Throughput at 11 Mbps data also increases about three times in comparison to data rate 1 Mbps. So we can use 11 mbps data rate for better IEEE wireless network performance. Simulation of Wormhole and Eavesdrop attacks proved that attack reduces the performance of network if security measures did not used. Throughput in Wormhole attack reduces by 17% in comparison to Eavesdrop attack. Average Jitter and Average End to End Delay reduces by 14% and 8% respectively in Eavesdrop attack in comparison to Wormhole attack. In this, several methods for improving WLAN performance were investigated. Using QUALNET software tool for network management and capacity planning several network models were created, different scenarios were chosen, simulation were executed and results were viewed and analyzed. We have simulated throughput, Average End to End delay, Average jitter, for no Security, WEP, CCMP service measures for WLAN network. We have classified over simulation in 3 different scenarios and their conclusion is as follows: [1]. Throughput of CCMP Security Protocol is more by 13.3% in comparison to WEP Security Protocol. [2]. In CCMP Average Jitter and Average End to End Delay are lesser by 7.4% and 10.24% respectively in comparison to WEP. [3]. As the number of nodes increases throughput decreases but values of Average Jitter and Average End to End Delay increase. So it can be concluded that it become difficult to provide security to the network as number of nodes increases. [4]. Increasing data rate reduces Average Jitter and Average End to End Delay because it take less time to transmit data from one node to another and increases Throughput at 11 Mbps data. REFERENCES 1. Abdul Qudoos Memon, Ali Hasan Raza and Sadia Iqbal, WLAN Security, International Journal of Computer Theory and Engineering, Vol. 1, No. 2, April 2011, pp Nilufar Baghaei and Ray Hunt, IEEE Wireless Lan Security Performance using multiple clients, IEEE Communications Surveys and Tutorials, Vol. 12, DOI: /IJIRSET
6 3. Stallings, W., IEEE : moving closer to practical wireless LANs, IT Professional. Volume: 3 Issue: 3. Page(s): 17 23, June Chye Bin Tay and Norman F. Schneidewind, Wireless LAN Extension, Journal of Convergence Information Technology, Vol. 5, No. 7, march 2003, pp QualNet Simulator 5.0, QualNet 5 users guide scalable network technologies Inc. 2010, pp Timothy X Brown, Jesse E. James and Amita Sethi, Jamming and Sensing of Encrypted Wireless Ad Hoc Networks, Published at Communications Magazine, IEEE, 2006 pp Yang Xiao, Chaitanya Bandela, Xiaojiang (James) Du and Yi Pan, Security mechanisms, attacks and security enhancements for the IEEE WLANs, International journal of Wireless and Mobile Computing, Vol. 1, Nos. 3/4, 2006, pp Marianne Azer, Sherif El-Kassas and Magdy El-Soudani, A Full Image of the Wormhole Attack Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks, International Journal of Computer Science and Information Security, Vol. 1, No. 1, May Ali Hamieh and Jalel Ben-Othman, Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution, Proceedings of Hotnets-V, Geethapriya Thamilarasu, Sumita Mishra and Ramalingam Sridhar, Improving Reliability of Jamming Attack Detection in Ad hoc Networks, Internationa Journal of Communication Networks and Information Security, Vol. 3, No. 1, April 2011, pp G. Jayanthi Lakshmi, S. Babu, B Lakshmana Rao, P Mohan and B Sunil Kumar, Jamming Attacks Prevention in Wireless Sensor Networks Using Secure Pack Hiding Method, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 9, September 2013, pp Rajpal Singh Khainwar, Mr. Anurag Jain and Mr. Jagdish Prasad Tyagi, Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath Algorithm, Network and Complex Systems ISSN X (Paper) ISSN (Online) Vol.3, No.7, 2013, pp DOI: /IJIRSET
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
PERFORMANCE ANALYSIS OF WLAN STANDARDS FOR VIDEO CONFERENCING APPLICATIONS
PERFORMANCE ANALYSIS OF WLAN STANDARDS FOR VIDEO CONFERENCING APPLICATIONS Lachhman Das Dhomeja 1, Shazia Abbasi 1, Asad Ali Shaikh 1, Yasir Arfat Malkani 2 1 Institute of Information and Communication
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA
Journal of Computer Science Original Research Paper CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA 1 Velayutham, R. and 2 D. Manimegalai
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Service Level Analysis of Video Conferencing over Wireless Local Area Network
Service Level Analysis of Video Conferencing over Wireless Local Area Network B.O. Sadiq, E. Obi, A.S. Abubakar, Y. Ibrahim & S. Saidu Department of Electrical and Computer Engineering Ahmadu Bello Unicersity
WI-FI TECHNOLOGY: SECURITY ISSUES
RIVIER ACADEMIC JOURNAL, VOLUME 2, NUMBER 2, FALL 2006 WI-FI TECHNOLOGY: SECURITY ISSUES Vandana Wekhande* Graduate student, M.S. in Computer Science Program, Rivier College Keywords: Wireless Internet,802.11b,
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
802.11 Wireless Networks The Definitive Guide
SECOND EDITION 802.11 Wireless Networks The Definitive Guide Matthew S. Gast ULB Darmstadt Illlllllllllllllllllllll,., s b f 17555820 m ' Koln " Sebastopol Tokyo Table of Contents Foreword Preface ix xi
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Introduction to Ad hoc Networks
Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
Overview of 802.11 Networks and Standards
Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 5, May 2015, 23-30 Impact Journals WI-FI SECURITY: A LITERATURE
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
802.11b and associated network security risks for the home user
802.11b and associated network security risks for the home user by Michael Osten [email protected] Background ================= Approved in 1997 by the IEEE 802 committee, 802.11 details the framework
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal 1,2 Department of CSE 1,2,3 BRCM Bahal, Bhiwani 1 [email protected], 2 [email protected] Abstract This paper
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
Dynamic Load Balancing and Channel Allocation in. Indoor Wireless Local Area Networks
Dynamic Load Balancing and Channel Allocation in Indoor Wireless Local Area Networks A Thesis Proposal Presented By Mohamad Haidar MS. Roosevelt University, Chicago, IL. 2002 BS. Lebanese American University,
Simulative Investigation of QoS parameters for VoIP over WiMAX networks
www.ijcsi.org 288 Simulative Investigation of QoS parameters for VoIP over WiMAX networks Priyanka 1, Jyoteesh Malhotra 2, Kuldeep Sharma 3 1,3 Department of Electronics, Ramgarhia Institue of Engineering
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop
Wireless LAN Services for Hot-Spot
Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute [email protected] ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks
International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
VoIP on WLAN, QoS issues and VoIP specifics
ETSI STQ Workshop Compensating for Packet Loss in Real-Time Applications, Feb 2003 VoIP on WLAN, QoS issues and VoIP specifics Alan Duric Sen. Systems Architect SIP/email: [email protected]
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,
Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.
Abstract. 1. IEEE 802.11. a. 802.11a b. 802.11b c. 802.11g 2. HiperLAN/2. 3. Bluetooth. 4. HomeRF.
A Detailed Study on Wireless LAN Technologies Vijay Chandramouli Department of Computer Science and Engineering The University of Texas at Arlington [email protected] Abstract Wireless Communication is an
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus Network in IEEE802.11e
ISSN (Online): 2409-4285 www.ijcsse.org Page: 8-13 Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus Network in IEEE802.11e M. K. Alam 1, S. A. Latif 2, M. Akter 3 and M. Y.
WLAN and IEEE 802.11 Security
WLAN and IEEE 802.11 Security Agenda Intro to WLAN Security mechanisms in IEEE 802.11 Attacks on 802.11 Summary Wireless LAN Technologies WLAN technologies are becoming increasingly popular, and promise
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Figure 1: Bandwidth and coverage of wireless technologies [2].
Simulation and Performance Evaluation of WiFi and WiMAX using OPNET Ravinder Paul, Sukhchandan Lally, and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {rpa28, lally,
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement Eric Cheng-Chung LO A dissertation submitted to Auckland University of Technology in partial fulfillment
LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM
LP-348 LP-Yagy2415 LP-1518 LP-5P LP-510G/550G 54M Wireless Adapter PCMCIA/PCI User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a
Wireless Local Area Networking For Device Monitoring
Wireless Local Area Networking For Device Monitoring by Colin Goldsmith Supervised By Professor Wendi Heinzelman A thesis submitted in partial fulfillment of the Requirements for the Degree of Masters
Modeling and Simulation of Quality of Service in VoIP Wireless LAN
Journal of Computing and Information Technology - CIT 16, 2008, 2, 131 142 doi:10.2498/cit.1001022 131 Modeling and Simulation of Quality of Service in VoIP Wireless LAN A. Al-Naamany, H. Bourdoucen and
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
XIV. Title. 2.1 Schematics of the WEP. 21. 2.2 Encryption in WEP technique 22. 2.3 Decryption in WEP technique. 22. 2.4 Process of TKIP 25
XIV LIST OF FIGURES Figure Title Page 2.1 Schematics of the WEP. 21 2.2 Encryption in WEP technique 22 2.3 Decryption in WEP technique. 22 2.4 Process of TKIP 25 2.5 IEEE 802.1x Structure 30 2.6 RSNA Architecture
Security in Wireless Mesh Networks
Thesis report, IDE 0949, June 2009 Security in Wireless Mesh Networks Master s Thesis in Computer Network Engineering Presented By: Shakeel Ahmad Ghumman Supervisor: Per-Arne-Wiberg School of Information
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
Simulation Based Analysis of VOIP over MANET
Simulation Based Analysis of VOIP over MANET Neeru Mehta 1, leena 2 M-Tech Student 1, Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal, Haryana, India Abstract In the last
Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks
ENSC 427: Communication Network Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks Simon Fraser University - Spring 2012 Claire Liu Alan Fang Linda Zhao Team 3 csl12 at sfu.ca
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
This tutorial has been prepared for readers to help them understand the concepts related to WiFi.
About the Tutorial is primarily a local area networking (LAN) technology designed to provide in-building broadband coverage. It is based on IEEE 802.11 specification. This tutorial gives you a basic understanding
MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY
MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY Nadher M. A. Al_Safwani, Suhaidi Hassan, and Mohammed M. Kadhum Universiti Utara Malaysia, Malaysia, {suhaidi, khadum}@uum.edu.my, [email protected]
TL-WN310G 54M Wireless CardBus Adapter
54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and
LTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
