• Login
    View Item 
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Dissertations and Theses
    • View Item
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Dissertations and Theses
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Evaluation of WEP, WPA and WPA2 security protocols on 802.11ac client to server WLAN performance

    Mohammed, Alghamdi Talal

    Thumbnail
    Share
    View fulltext online
    MComp_2016_Talal Alghamdi_1434244_Final Research.pdf (4.169Mb)
    Date
    2016
    Citation:
    Mohammed, A. T. (2016). Evaluation of WEP, WPA and WPA2 Security Protocols on 802.11ac Client to Server WLAN Performance. An unpublished thesis submitted in partial fulfilment of the requirements for the degree of Master of Computing, Unitec Institute of Technology, Auckland, New Zealand.
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/4534
    Abstract
    RESEARCH OBJECTIVE: The key objective of the research is to find out the impact of enabling security protocols on the WLAN performance in a real test bed environment. The research has measured the 802.11ac WLAN performance with WLAN security protocols enabled and disabled. Moreover, this research has used the IPv4 as well as IPv6, with TCP/UDP packet types. The collected data has been analysed in order to answer the research questions in chapter four. The overarching aim of this research is to evaluate the network performance of the latest approved IEEE WLAN standard “802.11ac” under various security protocols in Windows environment using TCP and UDP traffic for both IP versions (IPv4 & IPv6). The research was launched in a real test-bed setup, with a Client/Server network structure. The research involved an experiment that consisted of two PCs with Windows 10, Windows Server 2012 operating systems and one AP (Access Point). The performance was evaluated through the application of four different test cases. In the first test scenario, the standard network was configured with no security protocol enabled, which is known as open system. The other three test cases consisted of standard networks with security protocols enabled in each stage as WEP, WPA, and WPA2 respectively. The metrics that were used to measure network performance included throughput, round trip time (RTT), and CPU utilization. The results from the testing showed that the data throughput values in the open system were higher comparable to secured systems. However, the results demonstrated that the performance of throughput degraded while security protocols were enabled. Similarly, RTT values were also increased after enabling the security protocols. However, the WPA protocol showed different behaviour towards RTT with best performance and less round trip time. In the case of CPU utilization, the experimental results showed that IPv6 outperformed IPv4 for CPU utilization with throughput and RTT. The research results showed that among the three security protocols tested; WEP, WPA, and WPA2, the WPA protocol has the best results for network performance except for data throughput. In the case of IP protocols, IPv6 has better performance compared to IPv4 in 802.11ac, whereas UDP and TCP protocol does not have significant influences over network performance for 802.11ac. Based on these results, it is concluded that the iii WPA with the UDP protocol under IPv6 is the best possible configuration to have the best performance of 802.11ac under security protocols enabled.
    Keywords:
    Wireless LAN 802.11ac, WPA2 (Wi-Fi Protected Access 2), wireless local area networks (WLAN), Wired Equivalent Privacy (WEP), WEP, Wi-Fi Protected Access (WPA), WPA
    ANZSRC Field of Research:
    080303 Computer System Security, 080503 Networking and Communications
    Degree:
    Master of Computing, Unitec Institute of Technology
    Supervisors:
    Sarrafpour, Bahman; Kolahi, Samad
    Copyright Holder:
    Author

    Copyright Notice:
    All rights reserved
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use. These documents or images may be used for research or private study purposes. Whether they can be used for any other purpose depends upon the Copyright Notice above. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Dissertations and Theses [90]

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga

    Usage

    Downloads, last 12 months
    279
     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankContact us

    Help for authors  

    How to add research

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereInstitutionsStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaboratorThis CollectionStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaborator

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga