Encryption selection for WLAN IEEE802.11G
Wireless local area network (WLAN) has emerged over the past few years and has become a new channel in communication and shared resources. As the utilization of WLAN increased, it is important to study the impact on the performance of WLAN. The performance of this network is always a priority when u...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/64116/1/FSKTM%202013%2020IR.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-upm-ir.64116 |
---|---|
record_format |
uketd_dc |
spelling |
my-upm-ir.641162018-05-24T07:13:47Z Encryption selection for WLAN IEEE802.11G 2013-11 Ahmad, Zahrol Azam Wireless local area network (WLAN) has emerged over the past few years and has become a new channel in communication and shared resources. As the utilization of WLAN increased, it is important to study the impact on the performance of WLAN. The performance of this network is always a priority when users want to use this facility. In IEE802.11 WLAN, the users need to ensure the security of their data and the best performance. T he p er fo r ma nc e is always related with the use of encryption protocols. IEEE802.11 contains encryptions protocols that have three major generations, which are wired equivalent privacy (WEP), Wi-Fi protect access (WPA) and counter mode with cipher block chaining Mac protocol (CCMP). However, there are several opinions about the effect of using encryption on the performance of WLAN. A recent study claimed that encryption gives negligible impact to WLAN performance, while other studies showed that it degrades WLAN performance about 20%. Thus, these different findings have motivated this research. As for the solution, it proposes a mechanism of selecting encryption algorithms, which is able to help users to select the suitable encryption algorithm and encryption protocols for their secured communication in IEEE 802.11g WLAN. The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. In this study, MATLAB was used for the simulation and the parameters for the simulation were different size of text file, type of encryption algorithms and type of encryption protocols. The data size of text file used were 50 bytes to 300 bytes. The encryption algorithms consist of AES, DES and Blowfish while the encryption protocols consist of WEP, TKIP and AES/CCMP. There were two scenarios that have been tested in the simulation. In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. This encryption process occurred before transmitting the data through IEEE802.11 WLAN and encryption protocol at the access point. The results obtained from this simulation were time success and throughput. Through the results, time success was increased in both scenarios, as the data size became larger after it was encrypted. It also showed that DES algorithm produced the best time success along with WEP encryption protocol. As for the throughput, AES algorithm with WEP produced the best throughput in both scenarios, except when the size of data was 300 bytes, the results showed that Blowfish was the best encryption algorithm to be coupled with WEP encryption protocol. Based on the findings, it showed that this proposed mechanism can act as a guide to select which encryption algorithms and encryption protocols that provided in IEEE802.11 standards and also can ensure the best performance in WLAN. Wireless LANs Data encryption (Computer science) 2013-11 Thesis http://psasir.upm.edu.my/id/eprint/64116/ http://psasir.upm.edu.my/id/eprint/64116/1/FSKTM%202013%2020IR.pdf text en public masters Universiti Putra Malaysia Wireless LANs Data encryption (Computer science) |
institution |
Universiti Putra Malaysia |
collection |
PSAS Institutional Repository |
language |
English |
topic |
Wireless LANs Data encryption (Computer science) |
spellingShingle |
Wireless LANs Data encryption (Computer science) Ahmad, Zahrol Azam Encryption selection for WLAN IEEE802.11G |
description |
Wireless local area network (WLAN) has emerged over the past few years and has become a new channel in communication and shared resources. As the utilization of WLAN increased, it is important to study the impact on the performance of WLAN. The performance of this network is always a priority when users want to use this facility. In IEE802.11 WLAN, the users need to ensure the security of their data and the best performance. T he p er fo r ma nc e is always related with the use of encryption protocols. IEEE802.11 contains encryptions protocols that have three major generations, which are wired equivalent privacy (WEP), Wi-Fi protect access (WPA) and counter mode with cipher block chaining Mac protocol (CCMP). However, there are several opinions about the effect of using encryption on the performance of WLAN. A recent study claimed that encryption gives negligible impact to WLAN performance, while other studies showed that it degrades WLAN performance about 20%. Thus, these different findings have motivated this research. As for the solution, it proposes a mechanism of selecting encryption algorithms, which is able to help users to select the suitable encryption algorithm and encryption protocols for their secured communication in IEEE 802.11g WLAN. The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. In this study, MATLAB was used for the simulation and the parameters for the simulation were different size of text file, type of encryption algorithms and type of encryption protocols. The data size of text file used were 50 bytes to 300 bytes. The encryption algorithms consist of AES, DES and Blowfish while the encryption protocols consist of WEP, TKIP and AES/CCMP. There were two scenarios that have been tested in the simulation. In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. This encryption process occurred before transmitting the data through IEEE802.11 WLAN and encryption protocol at the access point. The results obtained from this simulation were time success and throughput. Through the results, time success was increased in both scenarios, as the data size became larger after it was encrypted. It also showed that DES algorithm produced the best time success along with WEP encryption protocol. As for the throughput, AES algorithm with WEP produced the best throughput in both scenarios, except when the size of data was 300 bytes, the results showed that Blowfish was the best encryption algorithm to be coupled with WEP encryption protocol. Based on the findings, it showed that this proposed mechanism can act as a guide to select which encryption algorithms and encryption protocols that provided in IEEE802.11 standards and also can ensure the best performance in WLAN. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Ahmad, Zahrol Azam |
author_facet |
Ahmad, Zahrol Azam |
author_sort |
Ahmad, Zahrol Azam |
title |
Encryption selection for WLAN IEEE802.11G |
title_short |
Encryption selection for WLAN IEEE802.11G |
title_full |
Encryption selection for WLAN IEEE802.11G |
title_fullStr |
Encryption selection for WLAN IEEE802.11G |
title_full_unstemmed |
Encryption selection for WLAN IEEE802.11G |
title_sort |
encryption selection for wlan ieee802.11g |
granting_institution |
Universiti Putra Malaysia |
publishDate |
2013 |
url |
http://psasir.upm.edu.my/id/eprint/64116/1/FSKTM%202013%2020IR.pdf |
_version_ |
1747812287877480448 |