تطورت الشبكات المحلية اللاسلكية لتصبح الخيار الأفضل في العديد من الحالات مثل المؤسسات الحكومية والمطارات وغيرها، لكن بسبب طبيعة وسط النقل المفتوح في هذه الشبكات زادت إمكانية الهجمات الأمنية، مما استدعى استخدام بروتوكولات أمنية لتحصين الشبكة ولحماية المستخدمين. يقدم هذا البحث دراسة وتقييم تأثير البروتوكولات الأمنية على أداء الشبكة المحلية اللاسلكية بهدف اختيار البروتوكول الأمثل، تم تقييم تأثير هذه البروتوكولات على أداء الشبكة عن طريق إضافة هذه البروتوكولات إلى بيئة المحاكي GloMoSim المفتوحة المصدر، حيث تظهر نتائج المحاكاة أن أداء هذه البروتوكولات يختلف حسب البيئة المطبقة ضمنها، ولا يوجد بروتوكول فعال في جميع البيئات، فالبروتوكول الأفضل ضمن بيئة ما ربما يكون الأسوأ في بيئة أخرى. أثبتت الدراسة أن البروتوكول الأمثل من ناحية الأداء فقط هو البروتوكول WEP، أما البروتوكول الأمثل من ناحية الأداء والأمن معاً هو البروتوكول WPA2، وهنا سيتوقف اختيارنا لأحد البروتوكولات الأمنية بحسب ما نريد تأمينه من مستوى حماية وأداء للشبكة.
WLANs have evolved into the best choice in a number of situations such as government institutions and airports, but because of the open transport in these networks increased the possibility of security attacks, which required the use of security protocols to protect the network and to protect users. This research examines and evaluates the impact of security protocols on WLAN performance in order to select the optimal protocol, the impact of these protocols on network performance has been evaluated by adding those Protocols to open source GloMoSim environment, And recent simulation results show that the performance of these protocols are varies according to the environment applied within them, noting that there is no effective Protocol in all environments, i.e. the suitable Protocol in an environment may be unsuitable in other ones. After comparing performance results in simulations with performance results in the real network, we can see that the best performance protocol is WEP. Also, The best protocol for both performance and security is the WPA2. Hence, our choice to one of the security protocols depends on what we want to secure in the level of protection and the performance of the network.
المراجع المستخدمة
M. ALSHAIKH, H. WATFA, "Improving Access to Network Applications Servers in A Client-Server Model", Faculty of Informatic Engineering, AL-BAATH University, Syria, (2017).
A. POTORAC, D. BALAN, "The Impact of Security Overheads on 802.11 WLAN Throughput". Faculty of Electrical Engineering and Compter Science, University of Suceava, Romania, 26-Sep, (2016).
P. OCHANG, P. IRVING, "Performance Analysis of Wireless Network Throughput and Security Protocol Integration". International Journal of Future Generation Communication and Networking, Vol. 9, pp. 71-78, No. 1 (2016).
B. DAGAR, N. GOYAL, "Integrating Enhanced Security Measures in WEP/WPA/WPA2-PSK". International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Feb, (2016).
P. JINDAL, B. SINGH, "Quantitative analysis of the security performance in wireless LANs". Journal of King Saud University - Computer and Information Sciences (JKSUCIS), 5-Nov, (2015).
T. BAKRI, A. BABIKER, A. NABIMUSTAFA, "A Comparative Study between WEP, WPA and WPA2 Security Algorithms". International Journal of Science and Research (IJSR), Index Copernicus Value 2013: 6.14 | Impact Factor 2013: 4.438, (2013).
A. RUMALE, N. CHAUDHARI, "IEEE 802.11x, and WEP, EAP,WPA / WPA2". Int. J. Comp. Tech. Appl. (IJCTA), NOV-DEC, (2011).
R. SHADI, M. TURAB, "A Formal Evaluation of the Security Schemes for Wireless Networks". Research Journal of Applied Sciences, Engineering and Technology, 20-Sep, (2011).
Li. PENG, S. KOLAHI, M. SAFDARI, M. ARGAWE, "Effect of WPA2 Security on IEEE 802.11n Bandwith and Round Trip Time in Peer-Peer Wireless Local Area Networks". Unitec, Department of Computing, New Zealand, (2010).
M. ATUL, A. GONSAI, "Bandwidth Performance testing of IEEE 802.11 Wireless Local Area Networks". International MultiConference of Engineers and Computer Scientists (IMECS), Hong Kong, 4-Mar, (2009).
A. LASHKARI, M. SEYED, B. SAMADI, "A Survey on Wireless Security protocols (WEP,WPA and WPA2/802.11i)". IEEE Xplore, Multimedia University (MMU), Malaysia, 1st Ed, 21-Sep, (2009).
H. RAGAB, Y. CHALLAL, "Enhanced WEP: A new efficient solution to WEP threats". Compiegne University of Technology, 1st Ed, (2009).
K. JAISWAL, OM PRAKASH, “Simulation of MANET using GloMoSim Network Simulator”. IJCSIT, Allahabad, U.P, India, Vol. 5 (4), (2014).
A. BECK, E. TEWS, "Practical attacks against WEP and WPA". TU-Dresden Germany, Germany, 1st Ed, (2008).
J. PEREZ, "A Servy of wireless network security protocols". Texas A&M University, (2008).
A. TRIPATHI, O. DAMANI, "Relative Encryption Overhead in 802.11g Network". International Symposium on Telecommunications, (2008).
D. COLEMAN, A. WESTCOTT, "CWNA® Certified Wireless Network Administrator". Wiley Publishing, Indiana, (2006).
R. MICHAEL, K. MEYER, S. KATIPAMULA, "Wireless Sensor Applications for Building Operation and Management". Pacific Northwest National Laboratory, Washington, (2005).
J. SCHILLER "What’s Wrong with WEP?". Lab. InteropNet 5 in a Series, (2005).
R. BLUM, "Network Performance Open Source Toolkit", Wiley, 1st Ed, United States, (2004).
J. NUEVO, "A Comprehensible GloMoSim Tutorial. INRS - Universite du Quebec, 1st Ed, 4-Mar, (2004).
D. WELCH, "Wireless Security Threat Taxonomy". United States Military Academy, 1st Ed, (2003).
J. KING, "An IEEE 802.11 Wireless LAN Security White Paper., Department of Energy, California, (2002).