Performance analysis of evolving wireless IEEE 802.11 security architectures
A Gin, R Hunt - Proceedings of the International Conference on Mobile …, 2008 - dl.acm.org
A Gin, R Hunt
Proceedings of the International Conference on Mobile Technology …, 2008•dl.acm.orgDegradation in performance has been a common reason for the limited use of security in
Wireless LAN equipment such as wireless PCs and embedded devices such as PDAs.
However, such performance has depended in part upon the technical options chosen for
encryption, authentication and re-keying. Thus this paper describes the performance
analysis and empirical measurement of a range of security levels based upon variations of
WEP, WPA and WPA2 in a variety of Wireless LAN architectures. The paper provides an …
Wireless LAN equipment such as wireless PCs and embedded devices such as PDAs.
However, such performance has depended in part upon the technical options chosen for
encryption, authentication and re-keying. Thus this paper describes the performance
analysis and empirical measurement of a range of security levels based upon variations of
WEP, WPA and WPA2 in a variety of Wireless LAN architectures. The paper provides an …
Degradation in performance has been a common reason for the limited use of security in Wireless LAN equipment such as wireless PCs and embedded devices such as PDAs. However, such performance has depended in part upon the technical options chosen for encryption, authentication and re-keying. Thus this paper describes the performance analysis and empirical measurement of a range of security levels based upon variations of WEP, WPA and WPA2 in a variety of Wireless LAN architectures. The paper provides an analysis of performance measured over a range of experiments run on a testbed and builds upon previous work on performance analysis of earlier wireless network security protocols.
ACM Digital Library
Showing the best result for this search. See all results