Home   >   CSC-OpenAccess Library   >    Manuscript Information
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Security Protocols
Talal Mohammed Alghamdi
Pages - 1 - 13     |    Revised - 31-03-2019     |    Published - 30-04-2019
Volume - 9   Issue - 1    |    Publication Date - April 2019  Table of Contents
IEEE 802.11ac, Throughput, Security Protocol, IPv4, IPv6.
WLAN (Wireless Local Area Networks) are gaining their grounds, and widely deployed in organizations, college campuses, public places, and residential areas. This growing popularity of WLAN makes these networks more vulnerable towards attacks and data thefts. Attacker attempts unauthorized access to the network for accessing the sensitive data of the users. Thus, it's necessary to address all the security challenges and its countermeasures using various encryption algorithms to prevent the attacks. However, with the use of security protocols the performance of the WLAN network can be varied. Thus this paper addresses the impact of various security protocols on the WLAN network, keeping throughput as the benchmark for network performance.

IEEE 802.11 ac is the latest wireless standard that operates in 5 Ghz frequency band with higher data rate, compare to its previous standards. This research has also chosen IEEE 802.11 ac standard for investigating the impact of security protocols including WEP (Wired Equivalent Privacy), WPA (WiFi Protected Access), and WPA2 (WiFi Protected Access 2) on throughput of WLAN IEEE 802.11 ac in Windows environment using TCP and UDP traffic for both IP versions (IPv4 & IPv6). The research was launched in a real test-bed setup, with a Client/Server network structure. The results from the experiment showed that the performance of data throughput in the open system were higher comparable to secured systems. However, the results demonstrated that the performance of throughput have different behavior to different security protocols under TCP/UDP traffic with IPV4 & IPV6. A detailed comparison of results in all scenarios is explained in the paper.
1 Google Scholar 
2 BibSonomy 
3 refSeek 
4 Scribd 
5 SlideShare 
A. Tsetse, E. Bonniord, P. Appiah-Kubi, and S. Tweneboah-Kodua, "Performance Study of the Impact of Security on 802.11 ac Networks," in Information Technology-New Generations: Springer, 2018, pp. 11-17.
E. Barka and M. Boulmalf, "On the Impact of Security on the Performance of WLANs," JCM, vol. 2, no. 4, pp. 10-17, 2007.
E. H. Ong, J. Kneckt, O. Alanen, Z. Chang, T. Huovinen, and T. Nihtil�, "IEEE 802.11 ac: Enhancements for very high throughput WLANs," in 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, 2011, pp. 849-853: IEEE.
E. Perahia, "IEEE 802.11 n development: History, process, and technology," IEEE Communications Magazine, vol. 46, no. 7, pp. 48-55, 2008.
K. Morinaga, H. Tsutsui, and Y. Miyanaga, "An evaluation of wireless video transmission using lossless video compression and 8� 8 MIMO-OFDM wireless transceiver," in 2013 13th International Symposium on Communications and Information Technologies (ISCIT), 2013, pp. 685-690: IEEE.
L. Kriara, E. C. Molero, and T. R. Gross, "Evaluating 802.11 ac features in indoor WLAN: an empirical study of performance and fairness," in Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization, 2016, pp. 17-24: ACM.
M.-D. Dianu, J. Riihij�rvi, and M. Petrova, "Measurement-based study of the performance of IEEE 802.11 ac in an indoor environment," in 2014 IEEE International Conference on Communications (ICC), 2014, pp. 5771-5776: IEEE.
O. Bejarano, E. W. Knightly, and M. Park, "IEEE 802.11 ac: from channelization to multi-user MIMO," IEEE Communications Magazine, vol. 51, no. 10, pp. 84-90, 2013.
O. E. Ademola, "Impact of Wireless Security Protocols on Data Throughput," Computing, Information Systems, Development Informatics & Allied Research Journal, vol. 8, no. 1, pp. 1-12, 2018.
P. A. Ochang and P. Irving, "Performance analysis of wireless network throughput and security protocol integration," Int J Future Generation Commun Netw, vol. 9, no. 1, pp. 71-78, 2016.
P. Likhar and R. S. Yadav, "Securing IEEE 802.11 g WLAN using OpenVPN and its impact analysis," arXiv preprint arXiv:1201.0428, 2012.
R. Karmakar, S. Chattopadhyay, and S. Chakraborty, "Impact of IEEE 802.11 n/ac PHY/MAC High Throughput Enhancements on Transport and Application Protocols�A Survey," IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2050-2091, 2017.
R. Liao, B. Bellalta, J. Barcelo, V. Valls, and M. Oliver, "Performance analysis of IEEE 802.11 ac wireless backhaul networks in saturated conditions," EURASIP Journal on Wireless Communications and Networking, vol. 2013, no. 1, p. 226, 2013.
R. Van Nee, "Breaking the gigabit-per-second barrier with 802.11 ac," IEEE Wireless Communications, vol. 18, no. 2, pp. 4-4, 2011.
S. Narayan, C. Jayawardena, J. Wang, and W. Ma, "Performance test of IEEE 802.11 ac wireless devices," in 2015 International Conference on Computer Communication and Informatics (ICCCI), 2015, pp. 1-6: IEEE.
S. Narayan, T. Feng, X. Xu, and S. Ardham, "Impact of wireless IEEE802. 11n encryption methods on network performance of operating systems," in 2009 Second International Conference on Emerging Trends in Engineering & Technology, 2009, pp. 1178-1183: IEEE.
S. Narayan, T. Feng, X. Xu, and S. Ardham, "Network performance evaluation of wireless IEEE802. 11n encryption methods on Windows Vista and Windows Server 2008 operating systems," in 2009 IFIP International Conference on Wireless and Optical Communications Networks, 2009, pp. 1-5: IEEE.
S. S. Kolahi and A. Almatrook, "Impact of Security on Bandwidth and Latency in IEEE 802.11 ac Client-to-Server WLAN," in 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), 2017, pp. 893-897: IEEE.
S. S. Kolahi and P. Li, "Evaluating IPv6 in peer-to-peer 802.11 n wireless LANs," IEEE Internet Computing, vol. 15, no. 4, pp. 70-74, 2011.
S. S. Kolahi, H. Singla, M. N. Ehsan, and C. Dong, "The influence of WPA2 security on the UDP performance of IPv4 and IPv6 using 802.11 n WLAN in Windows 7-Windows 2008 environment," in 2011 Baltic Congress on Future Internet and Communications, 2011, pp. 50-53: IEEE.
S. S. Kolahi, P. Li, M. Argawe, and M. Safdari, "WPA2 security-bandwith trade-off in 802.11 n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems," in 2012 IEEE Symposium on Computers and Communications (ISCC), 2012, pp. 000575-000579: IEEE.
S. S. Kolahi, Z. Qu, B. K. Soorty, and N. Chand, "The impact of security on the performance of IPv4 and IPv6 using 802.11 n wireless LAN," in 2009 3rd International Conference on New Technologies, Mobility and Security, 2009, pp. 1-4: IEEE.
T. A. Ashraf Bourawy, "Performance Analysis of IEEE 80.11ac Wireless Local Area Networks," International Journal of Advanced Research in Computer and Communication Engineering, vol. 6, no. 4, pp. 608-613, April 2017 2017.
T. Hayajneh, S. Khasawneh, B. Jamil, and A. Itradat, "Analyzing the impact of security protocols on wireless LAN with multimedia applications," in Proc. of The Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 2012.
T. N. Homepage. (20/02/2018). http://www.netperf.org/netperf
V. Kelly, "New ieee 802.11 ac� specification driven by evolving market need for higher, multi-user throughput in wireless lans," IEEE Standards Association, 2014.
Z. Shah, S. Rau, and A. Baig, "Throughput comparison of IEEE 802.11 ac and IEEE 802.11 n in an indoor environment with interference," in 2015 International Telecommunication Networks and Applications Conference (ITNAC), 2015, pp. 196-201: IEEE.
Mr. Talal Mohammed Alghamdi
Al Majmaah College of Technology Riyadh Saudi Arabia - Saudi Arabia