Impact of Implementing VPN to Secure Wireless LAN

Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the best security solutions could be found in open standards based technologies that can be delivered by Virtual Private Networking (VPN) being used for long time without addressing any security holes for the past few years. This work, addresses this issue and presents a simulated wireless LAN of IEEE802.11g protocol, and analyzes impact of integrating Virtual Private Network technology to secure the flow of traffic between the client and the server within the LAN, using OPNET WLAN utility. Two Wireless LAN scenarios have been introduced and simulated. These are based on normal extension to a wired network and VPN over extension to a wired network. The results of the two scenarios are compared and indicate the impact of improving performance, measured by response time and load, of Virtual Private Network over wireless LAN.




References:
[1] The Centre for Internet security, Networking Bench Mark, Thesis Title:
Wireless Networking Benchmark, version 1.0, April 2005.
[2] P. K. Neelakantham, Villanova University, Thesis Title: Wireless
Networking Study of IEEE 802.11 Specification Communication
Networks, Summer 2002.
[3] Self Study Report on Personal Area Network, Submitted by: H. Srikanth,
Guid.
[4] National Institute Standards and Technology (NIST), Thesis Title:
Wireless Network Security 802.11, Bluetooth and Handheld Devices,
By: Tom Karygiannis and Les Owens, 2002.
[5] DISA Field Security Operations, Final Draft Wireless Security Technical
Implementation Guide, Version 4, Release 0.3, 18th August 2005.
[6] N. Edde, Security Complete, Second Edition, 2002.
[7] Stockholm's University, Master Thesis: Security Centre for an
Enterprise, By Huxiodong, Feb 2005.
[8] Schlumberger Information Solutions, Houston, white Paper of: Virtual
Network Solutions for Remote Access, Comparison between SSL and
IPSec, 2004.
[9] R. Myers, Technology Industry, in Communication News, Article Title:
Combine VPN and Encryption - Wireless Security, 2003.
[10] Mercurion System Inc, Information Technology Consulting and Support
Services, White paper: Using VPN to Secure WLAN Traffic, 2004,
http://www.mercurionsystems.com.
[11] B. Lewis and P. T.Davis, Electronic Book, Wiley Publishing, Inc, 2004.
[12] NS Simulator for beginners, University De Los Andes, Sophia-
Antipolis, 2003.
[13] OPNET Modeler Accelerating Network R&D, Opnet 11.0 product
documentation, www.opnet.com/support.
[14] Cisco System Inc, Cisco Wireless Security, Chapter:8,
www.searchnetworking.techtarget.com/ searchnetworking /downloads
/chapter08.pdf.
[15] G. Bianchi, L. Fratta, M. Oliveri, "Performance Evaluation and
Enhancement of the CSMA/CA MAC Protocol for 802.11 Wireless
LANs", Proc. PIMRC 1996, October 1996, Taipei, Taiwan, pp. 392-396.
[16] G. Bianchi, "Performance Analysis of the IEEE 802.11 Distributed
Coordination Function," IEEE Journal on Selected Areas in
Communications, Vol. 18, No. 3, pp. 535-547, Mar. 2000.
[17] N.T. Dao and R.A. Malaney, "A New Markov Model for Non-Saturated
802.11 Networks", 5th IEEE Consumer Communications and
Networking Conference, 2008.