Many corporations are seriously concerned about
security of networks and therefore, their network supervisors are still
reluctant to install WLANs. In this regards, the IEEE802.11i standard
was developed to address the security problems, even though the
mistrust of the wireless LAN technology is still existing. The thought
was that the best security solutions could be found in open standards
based technologies that can be delivered by Virtual Private
Networking (VPN) being used for long time without addressing any
security holes for the past few years. This work, addresses this issue
and presents a simulated wireless LAN of IEEE802.11g protocol, and
analyzes impact of integrating Virtual Private Network technology to
secure the flow of traffic between the client and the server within the
LAN, using OPNET WLAN utility. Two Wireless LAN scenarios
have been introduced and simulated. These are based on normal
extension to a wired network and VPN over extension to a wired
network. The results of the two scenarios are compared and indicate
the impact of improving performance, measured by response time
and load, of Virtual Private Network over wireless LAN.
[1] The Centre for Internet security, Networking Bench Mark, Thesis Title:
Wireless Networking Benchmark, version 1.0, April 2005.
[2] P. K. Neelakantham, Villanova University, Thesis Title: Wireless
Networking Study of IEEE 802.11 Specification Communication
Networks, Summer 2002.
[3] Self Study Report on Personal Area Network, Submitted by: H. Srikanth,
Guid.
[4] National Institute Standards and Technology (NIST), Thesis Title:
Wireless Network Security 802.11, Bluetooth and Handheld Devices,
By: Tom Karygiannis and Les Owens, 2002.
[5] DISA Field Security Operations, Final Draft Wireless Security Technical
Implementation Guide, Version 4, Release 0.3, 18th August 2005.
[6] N. Edde, Security Complete, Second Edition, 2002.
[7] Stockholm's University, Master Thesis: Security Centre for an
Enterprise, By Huxiodong, Feb 2005.
[8] Schlumberger Information Solutions, Houston, white Paper of: Virtual
Network Solutions for Remote Access, Comparison between SSL and
IPSec, 2004.
[9] R. Myers, Technology Industry, in Communication News, Article Title:
Combine VPN and Encryption - Wireless Security, 2003.
[10] Mercurion System Inc, Information Technology Consulting and Support
Services, White paper: Using VPN to Secure WLAN Traffic, 2004,
http://www.mercurionsystems.com.
[11] B. Lewis and P. T.Davis, Electronic Book, Wiley Publishing, Inc, 2004.
[12] NS Simulator for beginners, University De Los Andes, Sophia-
Antipolis, 2003.
[13] OPNET Modeler Accelerating Network R&D, Opnet 11.0 product
documentation, www.opnet.com/support.
[14] Cisco System Inc, Cisco Wireless Security, Chapter:8,
www.searchnetworking.techtarget.com/ searchnetworking /downloads
/chapter08.pdf.
[15] G. Bianchi, L. Fratta, M. Oliveri, "Performance Evaluation and
Enhancement of the CSMA/CA MAC Protocol for 802.11 Wireless
LANs", Proc. PIMRC 1996, October 1996, Taipei, Taiwan, pp. 392-396.
[16] G. Bianchi, "Performance Analysis of the IEEE 802.11 Distributed
Coordination Function," IEEE Journal on Selected Areas in
Communications, Vol. 18, No. 3, pp. 535-547, Mar. 2000.
[17] N.T. Dao and R.A. Malaney, "A New Markov Model for Non-Saturated
802.11 Networks", 5th IEEE Consumer Communications and
Networking Conference, 2008.
[1] The Centre for Internet security, Networking Bench Mark, Thesis Title:
Wireless Networking Benchmark, version 1.0, April 2005.
[2] P. K. Neelakantham, Villanova University, Thesis Title: Wireless
Networking Study of IEEE 802.11 Specification Communication
Networks, Summer 2002.
[3] Self Study Report on Personal Area Network, Submitted by: H. Srikanth,
Guid.
[4] National Institute Standards and Technology (NIST), Thesis Title:
Wireless Network Security 802.11, Bluetooth and Handheld Devices,
By: Tom Karygiannis and Les Owens, 2002.
[5] DISA Field Security Operations, Final Draft Wireless Security Technical
Implementation Guide, Version 4, Release 0.3, 18th August 2005.
[6] N. Edde, Security Complete, Second Edition, 2002.
[7] Stockholm's University, Master Thesis: Security Centre for an
Enterprise, By Huxiodong, Feb 2005.
[8] Schlumberger Information Solutions, Houston, white Paper of: Virtual
Network Solutions for Remote Access, Comparison between SSL and
IPSec, 2004.
[9] R. Myers, Technology Industry, in Communication News, Article Title:
Combine VPN and Encryption - Wireless Security, 2003.
[10] Mercurion System Inc, Information Technology Consulting and Support
Services, White paper: Using VPN to Secure WLAN Traffic, 2004,
http://www.mercurionsystems.com.
[11] B. Lewis and P. T.Davis, Electronic Book, Wiley Publishing, Inc, 2004.
[12] NS Simulator for beginners, University De Los Andes, Sophia-
Antipolis, 2003.
[13] OPNET Modeler Accelerating Network R&D, Opnet 11.0 product
documentation, www.opnet.com/support.
[14] Cisco System Inc, Cisco Wireless Security, Chapter:8,
www.searchnetworking.techtarget.com/ searchnetworking /downloads
/chapter08.pdf.
[15] G. Bianchi, L. Fratta, M. Oliveri, "Performance Evaluation and
Enhancement of the CSMA/CA MAC Protocol for 802.11 Wireless
LANs", Proc. PIMRC 1996, October 1996, Taipei, Taiwan, pp. 392-396.
[16] G. Bianchi, "Performance Analysis of the IEEE 802.11 Distributed
Coordination Function," IEEE Journal on Selected Areas in
Communications, Vol. 18, No. 3, pp. 535-547, Mar. 2000.
[17] N.T. Dao and R.A. Malaney, "A New Markov Model for Non-Saturated
802.11 Networks", 5th IEEE Consumer Communications and
Networking Conference, 2008.
@article{"International Journal of Electrical, Electronic and Communication Sciences:58289", author = "H. Bourdoucen and A. Al Naamany and A. Al Kalbani", title = "Impact of Implementing VPN to Secure Wireless LAN", abstract = "Many corporations are seriously concerned about
security of networks and therefore, their network supervisors are still
reluctant to install WLANs. In this regards, the IEEE802.11i standard
was developed to address the security problems, even though the
mistrust of the wireless LAN technology is still existing. The thought
was that the best security solutions could be found in open standards
based technologies that can be delivered by Virtual Private
Networking (VPN) being used for long time without addressing any
security holes for the past few years. This work, addresses this issue
and presents a simulated wireless LAN of IEEE802.11g protocol, and
analyzes impact of integrating Virtual Private Network technology to
secure the flow of traffic between the client and the server within the
LAN, using OPNET WLAN utility. Two Wireless LAN scenarios
have been introduced and simulated. These are based on normal
extension to a wired network and VPN over extension to a wired
network. The results of the two scenarios are compared and indicate
the impact of improving performance, measured by response time
and load, of Virtual Private Network over wireless LAN.", keywords = "IEEE802.11, VPN, Networking, Secure Wireless,
WLAN, Opnet.", volume = "3", number = "3", pages = "502-6", }