ON THE EVALUATION OF A SECURE SOLUTION TO ACCESS 802.11 NETWORKS
Fernando da Costa Junior, Luciano Gaspary, Jorge Barbosa, Gerson Cavalheiro, Luciano Pfitscher
2005
Abstract
Despite offering the possibility to develop and distribute a new set of applications to its users, the widespread and unrestricted use of mobile computing depends on the provisioning of a secure network environment. Regarding the communication established from mobile devices such as PDAs (Personal Digital Assistants), one of the most currently used standards is the IEEE 802.11b, which presents known security flaws. To overcome them, some alternative setups are commonly deployed, based on link, network, transport or application-layer. In this paper we evaluate the impact on data reception rate and energy consumption of IPSec-based PDAs access to 802.11b (WiFi) wireless LANs. As a result of this work we identify the overhead imposed by the security mechanisms and the capacity of the device to run CPU and network-intensive applications.
References
- (2004). Crypto ip encapsulation. http://www.extra300.nl.
- (2004). Linux frees/wan. http://www.freeswan.org.
- (2004). Linux kernel archives. http://www.kernel.org/.
- (2004). Openvpn. http://openvpn.sourceforge.net.
- (2004). Secure electronic transaction. http://www.setco.org.
- (2004). Virtual tunnels http://vtun.sourceforge.net.
- Cam-Winget, N., Housley, R., Wagner, D., and Walker, J. (2003). Security flaws in 802.11 data link protocols. In Communications of the ACM.
- Freier, A. O., Karlton, P., and Kocher, P. C. (1996). The ssl protocol version 3.0. In IETF Internet Draft.
- Karri, R. and Mishra, P. (2003). Optimizing the energy consumed by secure wireless sessions: Wireless transport layer security case study. In Mobile Networks and Applications.
- Kent, S. and Atkinson, R. (2004). Security architecture for the internet protocol. In IETF RFC 2401.
- Maciel, P., Nunes, B., Campos, C., and Moraes, L. (2003). Sobrecarga introduzida nas redes 802.11 pelos mecanismos de segurana wep e vpn/ipsec. In 3rd Brazilian Workshop on Security of Computing Systems.
- Potlapally, N., Ravi, S., Raghunathan, A., and Jha, N. (2003). Analyzing the energy consumption of security protocols. In Dept. of Electrical Engineering, Princeton University.
- Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G., and Palter, B. (1999). Layer two tunneling protocol l2tp. In IETF RFC 2661.
Paper Citation
in Harvard Style
da Costa Junior F., Gaspary L., Barbosa J., Cavalheiro G. and Pfitscher L. (2005). ON THE EVALUATION OF A SECURE SOLUTION TO ACCESS 802.11 NETWORKS . In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE, ISBN 972-8865-33-3, pages 74-79. DOI: 10.5220/0001416800740079
in Bibtex Style
@conference{icete05,
author={Fernando da Costa Junior and Luciano Gaspary and Jorge Barbosa and Gerson Cavalheiro and Luciano Pfitscher},
title={ON THE EVALUATION OF A SECURE SOLUTION TO ACCESS 802.11 NETWORKS},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE,},
year={2005},
pages={74-79},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001416800740079},
isbn={972-8865-33-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 2: ICETE,
TI - ON THE EVALUATION OF A SECURE SOLUTION TO ACCESS 802.11 NETWORKS
SN - 972-8865-33-3
AU - da Costa Junior F.
AU - Gaspary L.
AU - Barbosa J.
AU - Cavalheiro G.
AU - Pfitscher L.
PY - 2005
SP - 74
EP - 79
DO - 10.5220/0001416800740079