Performance Evaluation and Protection Management for Wireless Networks

Performance Evaluation and Protection Management for Wireless Networks
Author:
Publisher:
Total Pages:
Release: 2004
Genre:
ISBN:

Download Performance Evaluation and Protection Management for Wireless Networks Book in PDF, Epub and Kindle

Wireless networks are more vulnerable to attacks compared with wired networks due to their open and shared medium. A number of security mechanisms are available for providing different levels of protection, but with a side effect that is performance degradation. Given a wide range of real-time and non real-time applications, there is a critical demand for providing better performance in wireless networks. Motivated by this demand and the limitations of current research, we devote this dissertation to performance evaluation, and protection management in wireless networks. In this dissertation, we first study the performance impact of security mechanisms at different networking layers in wireless LANs, on a testbed with IP mobility support. One of the important observations is that statically configured security mechanisms may not be used to achieve a satisfactory performance. Motivated by the results of our first study, we propose a Self-TunEd Performance and Protection (STEP2) management framework, which is a generalized architecture for balancing the protection strength and performance for wireless clients based on network and user requirements. By implementing STEP2 in a wireless LAN testbed, we demonstrate the benefits of STEP2 such as significant reduction in delay and packet losses in various scenarios. With the growing deployment of multi-hop networks, we next extend our research to wireless mesh networks. Specifically, we investigate the performance impact of attacks in wireless mesh networks (WMNs). We study path-based denial of service (DoS) attacks as they are easy to carry out and can cause significant performance degradation. The measurements obtained in a wireless mesh testbed demonstrate the interaction between a set of factors, such as link qualities, physical diversity, packet size and rate, and the intensity of path-based DoS attacks. We believe that the comprehensive results in this dissertation will shed new lights on the performance analysis of s.

Quality of Service Architectures for Wireless Networks: Performance Metrics and Management

Quality of Service Architectures for Wireless Networks: Performance Metrics and Management
Author: Adibi, Sasan
Publisher: IGI Global
Total Pages: 716
Release: 2010-01-31
Genre: Computers
ISBN: 1615206817

Download Quality of Service Architectures for Wireless Networks: Performance Metrics and Management Book in PDF, Epub and Kindle

"This book further explores various issues and proposed solutions for the provision of Quality of Service (QoS) on the wireless networks"--Provided by publisher.

Performance Evaluation of Clustering Algorithms in Wireless Sensor Networks (WSN). Energy Efficiency of S-Web and LEACH

Performance Evaluation of Clustering Algorithms in Wireless Sensor Networks (WSN). Energy Efficiency of S-Web and LEACH
Author: Sahil Sholla
Publisher: GRIN Verlag
Total Pages: 41
Release: 2015-03-27
Genre: Computers
ISBN: 3656930007

Download Performance Evaluation of Clustering Algorithms in Wireless Sensor Networks (WSN). Energy Efficiency of S-Web and LEACH Book in PDF, Epub and Kindle

Master's Thesis from the year 2013 in the subject Computer Science - Miscellaneous, grade: -, , course: Master of Technology, language: English, abstract: Wireless Sensor Networks (WSNs) are highly integrated technologies applying sensors, microcontrollers and wireless networks technologies. Wireless sensor networks (WSNs) is a promising technology that has a large spectrum of applications such as, battlefield reconnaissance, border protection and security surveillance, preparing forecasts, severe environment detection, volcano monitoring, disaster management. WSNs operate unattended in harsh environments with limited energy supplies that can’t be practically changed or recharged. Thus energy efficiency is a critical design issue which must be addressed. Clustering plays an effective role in judicious use of dwindling energy resources of the deployed sensor nodes. Nodes are grouped into clusters and a specific designated node, called the cluster head is responsible for collecting data from the nodes in its cluster, aggregating them and sending to the BS, where data can be retrieved later. Besides energy efficiency, clustering has many other advantages like reduced routing overhead, conservation of communication bandwidth, stabilized network topology, network stability etc In this research, we study the energy efficiency of two clustering algorithms, S-Web and LEACH and compare them for network lifetime. Simulation results show that the S-Web clustering mechanism achieves a noticeable improvement in the network lifetime.

Evaluation of WLAN Security and Performance

Evaluation of WLAN Security and Performance
Author: Alikira Richard
Publisher: GRIN Verlag
Total Pages: 42
Release: 2012-12-06
Genre: Computers
ISBN: 3656331030

Download Evaluation of WLAN Security and Performance Book in PDF, Epub and Kindle

Research Paper (postgraduate) from the year 2012 in the subject Computer Science - Internet, New Technologies, Kampala International University (School of postgraduate studies/computer department), course: Network security, language: English, abstract: This report addresses the reality of Wireless LAN security and performance. It provides an overview of security mechanisms and explains how security works in Wireless LAN networks. An in depth analysis of the Wired Equivalent Privacy (WEP), Wi-Fi protected access (WPA) and WPA2 standards is presented. The security vulnerabilities that exist in them are analyzed and explained. An experiment involving four devices (Dlink, Linksys, nanostationloco2 and a WBS) was done at Kampala international university. It was discovered from literature that most people prefer using WEP yet it is least secure. One study says 30% of all WLANs detected during network discovery experiment operate with WEP encryption. The study further proved that WEP can be compromised with 100% success. It was also discovered during the experiment that factors such as line of sight, obstruction, distance, antenna type, channel being used all affect network performance. The findings of this experiment can be used as guideline choosing the right encryption method and in designing a WLAN.