Show simple item record

dc.contributor.authorMcCarter, Harold Larsen_US
dc.date.accessioned2014-03-14T20:33:56Z
dc.date.available2014-03-14T20:33:56Z
dc.date.issued2006-04-17en_US
dc.identifier.otheretd-04202006-080941en_US
dc.identifier.urihttp://hdl.handle.net/10919/31789
dc.description.abstractWireless local area networks (WLAN) are beginning to play a much larger role in corporate network environments and are already very popular for home networking applications. This increase in accessibility has created large security holes for hackers and thieves to abuse, which is finally being addressed by stronger security methods such as advanced encryption algorithms and efficient authentication processes. However, these security methods often hamper network performance unbeknownst to engineers and users. This research examines the effects of Wired Equivalent Privacy (WEP), Temporal Key Integrity Protocol (TKIP), and Counter Mode/CBC-MAC Protocol (CCMP) encryption algorithms on throughput rates for IEEE 802.11 networks as well as the authentication times for Lightweight Extensible Authentication Protocol (LEAP) and Protected Extensible Authentication Protocol (PEAP). The research shows that todayâ s wireless hardware is capable of reducing overhead of even the most advanced encryption schemes to less than five percent of the total bandwidth.en_US
dc.publisherVirginia Techen_US
dc.relation.haspartmccarter_thesis.pdfen_US
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to Virginia Tech or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.subjectTKIPen_US
dc.subjectWireless Network Securityen_US
dc.subjectEncryption Overheaden_US
dc.subjectAuthentication Delayen_US
dc.subjectCCMPen_US
dc.subjectPEAPen_US
dc.subjectWEPen_US
dc.subjectLEAPen_US
dc.titleAnalyzing Wireless LAN Security Overheaden_US
dc.typeThesisen_US
dc.contributor.departmentElectrical and Computer Engineeringen_US
dc.description.degreeMaster of Scienceen_US
thesis.degree.nameMaster of Scienceen_US
thesis.degree.levelmastersen_US
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen_US
thesis.degree.disciplineElectrical and Computer Engineeringen_US
dc.contributor.committeechairMidkiff, Scott F.en_US
dc.contributor.committeememberDaSilva, Luiz A.en_US
dc.contributor.committeememberZaghloul, Amir I.en_US
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-04202006-080941/en_US
dc.date.sdate2006-04-20en_US
dc.date.rdate2006-05-16
dc.date.adate2006-05-16en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record