Avaliando a Sobrecarga Introduzida nas Redes 802.11 pelos Mecanismos de Segurança WEP e VPN/IPSec
Abstract
This paper presents a comparative analysis of the overhead introduced in IEEE 802.11b networks, by the security mechanisms WEP and VPN/IPSec. TCP and UDP traffic behavior are analysed under different local wireless environments, as a function of the number of active connections and the security solution implemented. Through this analysis, it is possible to estimate the most appropriate security mechanism to be applied in the intended wireless environment, in terms of the transport layer protocol utilized and the wanted security level.References
802.11b, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification: Higher-Speed Physical Layer Extension in the 2.4 GHz Band. IEEE Std 802.11b, 1999.
W. W. U. Murthy, O. Bukhres and E. Vanderdez, “Firewalls for Security in Wireless Networks,” in Thisty-First Annual Hawaii International Conference on System Scicens, jan 1998.
H. M. A. Prasad and J. Kruys, “Security Architecture for Wireless LANs: Corporate & Public Environment,” IEEE VTC2000, 2000.
802.1x, Standard for Port Based Network Access Control. IEEE Std 802.11b, 2000.
M. Casole, “WLAN Security Status, Problems and Perspective,” in European Wireless 2002, feb 2002.
R. A. S. Kent, “Security Architecture for the Internet Protocol,” IETF RFC 2401, nov 1998.
N. D. R. Thayer and R. Glenn, “IP Security Document Roadmap,” IETF RFC 2411, nov 1998.
RC4: Encrypty Algoritm of RSA Security, 2003. http://www.rsasecurity.com.
R. A. S. Kent, “IP Authentication Header,” IETF RFC 2402, nov 1998.
R. A. S. Kent, “IP Encapsulating Security Payload (ESP),” IETF RFC 2406, nov 1998.
M. S. D. Maughan, M. Schertler and J. Turner, “Internet Security Association and Key Management Protocol (ISAKMP),” IETF RFC 2408, nov 1998.
SSH Sentinel: Client Software for VPN/IPSec, 2003. http://www.ssh.com.
IP Traffic: a Tool for Generation and Monitoring of Traffic, 2003. http://www.zti-telecom.com.
W. W. U. Murthy, O. Bukhres and E. Vanderdez, “Firewalls for Security in Wireless Networks,” in Thisty-First Annual Hawaii International Conference on System Scicens, jan 1998.
H. M. A. Prasad and J. Kruys, “Security Architecture for Wireless LANs: Corporate & Public Environment,” IEEE VTC2000, 2000.
802.1x, Standard for Port Based Network Access Control. IEEE Std 802.11b, 2000.
M. Casole, “WLAN Security Status, Problems and Perspective,” in European Wireless 2002, feb 2002.
R. A. S. Kent, “Security Architecture for the Internet Protocol,” IETF RFC 2401, nov 1998.
N. D. R. Thayer and R. Glenn, “IP Security Document Roadmap,” IETF RFC 2411, nov 1998.
RC4: Encrypty Algoritm of RSA Security, 2003. http://www.rsasecurity.com.
R. A. S. Kent, “IP Authentication Header,” IETF RFC 2402, nov 1998.
R. A. S. Kent, “IP Encapsulating Security Payload (ESP),” IETF RFC 2406, nov 1998.
M. S. D. Maughan, M. Schertler and J. Turner, “Internet Security Association and Key Management Protocol (ISAKMP),” IETF RFC 2408, nov 1998.
SSH Sentinel: Client Software for VPN/IPSec, 2003. http://www.ssh.com.
IP Traffic: a Tool for Generation and Monitoring of Traffic, 2003. http://www.zti-telecom.com.
Published
2003-05-01
How to Cite
MACIEL JÚNIOR, Paulo Ditarso; NUNES, Bruno Astuto Arouche; CAMPOS, Carlos Alberto Vieira; MORAES, Luís Felipe Magalhães de.
Avaliando a Sobrecarga Introduzida nas Redes 802.11 pelos Mecanismos de Segurança WEP e VPN/IPSec. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 3. , 2003, Natal.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2003
.
p. 17-24.
DOI: https://doi.org/10.5753/sbseg.2003.21245.
