Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30184
Impact of Implementing VPN to Secure Wireless LAN

Authors: H. Bourdoucen, A. Al Naamany, A. Al Kalbani

Abstract:

Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the best security solutions could be found in open standards based technologies that can be delivered by Virtual Private Networking (VPN) being used for long time without addressing any security holes for the past few years. This work, addresses this issue and presents a simulated wireless LAN of IEEE802.11g protocol, and analyzes impact of integrating Virtual Private Network technology to secure the flow of traffic between the client and the server within the LAN, using OPNET WLAN utility. Two Wireless LAN scenarios have been introduced and simulated. These are based on normal extension to a wired network and VPN over extension to a wired network. The results of the two scenarios are compared and indicate the impact of improving performance, measured by response time and load, of Virtual Private Network over wireless LAN.

Keywords: IEEE802.11, VPN, Networking, Secure Wireless, WLAN, Opnet.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1072349

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2554

References:


[1] The Centre for Internet security, Networking Bench Mark, Thesis Title: Wireless Networking Benchmark, version 1.0, April 2005.
[2] P. K. Neelakantham, Villanova University, Thesis Title: Wireless Networking Study of IEEE 802.11 Specification Communication Networks, Summer 2002.
[3] Self Study Report on Personal Area Network, Submitted by: H. Srikanth, Guid.
[4] National Institute Standards and Technology (NIST), Thesis Title: Wireless Network Security 802.11, Bluetooth and Handheld Devices, By: Tom Karygiannis and Les Owens, 2002.
[5] DISA Field Security Operations, Final Draft Wireless Security Technical Implementation Guide, Version 4, Release 0.3, 18th August 2005.
[6] N. Edde, Security Complete, Second Edition, 2002.
[7] Stockholm's University, Master Thesis: Security Centre for an Enterprise, By Huxiodong, Feb 2005.
[8] Schlumberger Information Solutions, Houston, white Paper of: Virtual Network Solutions for Remote Access, Comparison between SSL and IPSec, 2004.
[9] R. Myers, Technology Industry, in Communication News, Article Title: Combine VPN and Encryption - Wireless Security, 2003.
[10] Mercurion System Inc, Information Technology Consulting and Support Services, White paper: Using VPN to Secure WLAN Traffic, 2004, http://www.mercurionsystems.com.
[11] B. Lewis and P. T.Davis, Electronic Book, Wiley Publishing, Inc, 2004.
[12] NS Simulator for beginners, University De Los Andes, Sophia- Antipolis, 2003.
[13] OPNET Modeler Accelerating Network R&D, Opnet 11.0 product documentation, www.opnet.com/support.
[14] Cisco System Inc, Cisco Wireless Security, Chapter:8, www.searchnetworking.techtarget.com/ searchnetworking /downloads /chapter08.pdf.
[15] G. Bianchi, L. Fratta, M. Oliveri, "Performance Evaluation and Enhancement of the CSMA/CA MAC Protocol for 802.11 Wireless LANs", Proc. PIMRC 1996, October 1996, Taipei, Taiwan, pp. 392-396.
[16] G. Bianchi, "Performance Analysis of the IEEE 802.11 Distributed Coordination Function," IEEE Journal on Selected Areas in Communications, Vol. 18, No. 3, pp. 535-547, Mar. 2000.
[17] N.T. Dao and R.A. Malaney, "A New Markov Model for Non-Saturated 802.11 Networks", 5th IEEE Consumer Communications and Networking Conference, 2008.