OpenVPN Comparison with WEP.

OpenVPN Comparison with WEP.

Source publication
Article
Full-text available
Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdroppi...

Context in source publication

Context 1
... Table 3 shows how OpenVPN overcomes the WEP vulnerabilities by comparing it with WEP on various parameters. Vulnerable to these attacks [5], [7], [8] Secure against these attacks ...

Citations

... Data integrity, confidentiality, and authentication can all be achieved via the use of virtual private network (VPN) technology. A VPN connects a network to another network or a remote user to another network through the use of an encrypted tunnel across the public Internet [8], [9]. Data is encapsulated within an IP packet before it can be delivered through a VPN [8], [9]. ...
... A VPN connects a network to another network or a remote user to another network through the use of an encrypted tunnel across the public Internet [8], [9]. Data is encapsulated within an IP packet before it can be delivered through a VPN [8], [9]. However, the VPN connection's encapsulation and end-to-end encryption may slow down the wireless connection speed, affecting real-time streaming functionality. ...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs) are popular and are used for surveillance and safety purposes, thus often include live video streaming. An attacker with knowledge of the flight controller’s settings can intercept the camera footage/stream. A virtual private network (VPN) connection is considered as one of the solutions in preventing unauthorised interception, but with a cost. In providing end-to-end encryption connection, the VPN connection can slow the wireless connection speed and, thus, impact the real-time streaming. This article describes the implementation of the IoT-based live video streaming system with VPN and analyses the live streaming performance based on quality of service (QoS) measurements. Comparative analysis between video streaming with and without VPN is presented.
... • Alternatives for Secure Remote Access: Cisco offers AnyConnect VPN service to supply a secure remote access (VPN connection). As an alternative, OpenVPN [46] has been used in different solutions [47], [48], [49]. It has also shown a solid and portable implementation, where clients can use standard software to connect to the real-time simulation system [47]. ...
... At the same time, in order to ensure that the video signaling and video stream sent from the client can be transmitted safely, this article is based on the 0pen VPN tunnel technology and uses OpenSSL soft algorithm to achieve encryption. At the same time, SD smart card is introduced to adopt hardware encryption algorithm [6,7]. ...
Article
Full-text available
Mobile police video security access link is an important boundary channel to ensure the secure and trusted access of mobile video in the private video network. Therefore, this paper proposes a three-step strategy for access control, encrypted transmission, and wireless video security inspection. While carrying the ability to carry higher video streams, it is both safe and reliable, and has strong scalability in performance. This paper analyzes the access mechanism of SSL VPN in encryption, identity authentication and resource access control. Proposes a mobile police video security access link solution based on SSL VPN for network clients. Respectively presents a secure access solution for wired video and wireless video. And a load balancing access scheme based on NAT address translation is designed. Finally, a test scenario for the maximum number of concurrent users and server bandwidth performance is designed, implemented and analyzed. In actual application, the trial projects have been highly recognized by public security customers.
... The IEEE 802.11 gives a criterion for WLAN communications among devices [7]. The IEEE in 1997 developed the 802.11 standard which is a subset of the 802 standards. ...
... 802.11b, 802.11g, 802.11n and 802.11ac [8]. The most common and widely used among the standard are the 802.11a, 802.11b and 802.11g [7]. ...
... The IEEE 802.11 developed WEP in 1999 to endow security for wireless network as compared to the wired [3]. The WEP encryption is based on RC4 symmetric stream cipher with 40bit and 104-bit encryption keys [7]. WEP involves two parameters, an Initialization Vector (IV) which is a three (3) byte value and shared WEP Key of hexadecimal digits for encryption and decryption. ...
Article
Full-text available
The use of wireless network as a medium of communication has tremendously increased due to its flexibility, mobility and easy accessibility. Its usage is inevitable at hotels and restaurants, airports, organizations and currently predominant in homes. As large number of devices connect to wireless network, valuable and sensitive information are shared among users in the open air, attackers can easily sniff and capture data packets. This paper aims at using penetration testing to assess vulnerabilities and conduct attacks on Wireless Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802.11i (WPA2) security protocols. The penetration testing was conducted using Kali Linux with its Aircrack-ng tools.
... The reasons for its popularity include easy setup, mobility support, and low cost. IEEE 802.11, commonly known as Wi-Fi, is a set of standards for implementing WLAN in 2.4, 3.6, 5 and 60 GHz bands [143]. The 802.11 and 802.11b are the oldest ones released in 1999. ...
Preprint
Full-text available
This survey studies the potential data link candidates for unmanned aircraft vehicles (UAVs). There has been tremendous growth in different applications of UAVs such as lifesaving and rescue missions, commercial use, recreations, etc. Unlike the traditional wireless communications, the data links for these systems do not have any general standardized framework yet to ensure safe co-existence of UAVs with other flying vehicles. This motivated us to provide a comprehensive survey of potential data link technologies available for UAVs. Our goal is to study the current trends and available candidates and carry out a comprehensive comparison among them. The contribution of this survey is to highlight the strength and weakness of the current data link options and their suitability to satisfy the UAVs communication requirements. Satellite links, cellular technologies, Wi-Fi and several similar wireless technologies are studied thoroughly in this paper. We also focus on several available promising standards that can be modified for these data links. Then, we discuss standard-related organizations that are working actively in the area of civilian unmanned systems. Finally, we bring up some future challenges in this area with several potential solutions to motivate further research work.
... To the best of our knowledge, few known security studies have been performed on 802.11ac. Most security studies conducted on wireless standards were conducted on 802.11b/g/n [13], [14] [15], [16], [17] and [18]. These papers studied the effect of security on performance in WLANs and the robustness of the security standards implemented in these wireless standards. ...
Chapter
Full-text available
Wireless Local Area Networks (WLAN) are gaining popularity due to the ease of use and ubiquity. Notwithstanding, their inherent characteristics make them more vulnerable to security breaches compared to wired networks. IEEE 802.11ac specification is currently the widely used WLAN standard deployed by most organizations. We study the impact of security on 802.11AC WLANs using different security modes (No Security, Personal and Enterprise Security) using a test WLAN. The performance analysis is based on throughput, delay, jitter, loss ratio and connection time. Our experiments indicate a performance improvement when no security is implemented relative to other security modes. For throughput performance, improvements ranged between 1.6% and 8.2% depending on the transport (TCP/UDP) and network (IPv4/IPv6) layer protocol. Improvements between 2.8% and 7.9% was observed when no security is implemented for delay. Jitter, Loss Ratio and connection time experienced between 1.3% and 18.6% improvement in performance. Though the performance degradation because of implementing security measures on 802.11ac WLANs appear relatively insignificant per the study, we believe the situation could be different when a heterogeneously complex setup is used. However, other factors (e.g. channel congestion, interference etc.) may equally be responsible for the performance degradation in WLANs that may not be necessarily security related.
... To the best of our knowledge, few known security studies have been performed on 802.11ac. Most security studies conducted on wireless standards were conducted on 802.11b/g/n [13], [14] [15], [16], [17] and [18]. These papers studied the effect of security on performance in WLANs and the robustness of the security standards implemented in these wireless standards. ...
... Results indicate that IPv4 performs better providing the highest bandwidth for UDP. An open VPN, rather than WEP was implemented in [28,29] for the security of IEEE 802.11g. The authors claimed that WEP can be replaced by the open VPN to obtain better performance in terms of throughput, response time, jitter, and frame loss. ...
Article
Full-text available
There has been an extensive and widespread deployment of wireless local area networks (WLANs) for information access. The transmission, being of a broadcast nature, is vulnerable to security threats and hence, the aspect of security provisioning in these networks has assumed an important dimension. The security of the transmitted data over a wireless channel aims at protecting the data from unauthorized access. The objective is achieved by providing advanced security mechanisms. Implementing strong security mechanisms however, affects the throughput performance and increases the complexity of the communication system. In this paper, we investigate the security performance of a WLAN based on IEEE 802.11b/g/n standards on an experimental testbed in congested and uncongested networks in a single and multi-client environment. Experimental results are obtained for a layered security model encompassing nine security protocols in terms of throughput, response time, and encryption overhead. The performance impact of transmission control protocol and user datagram protocol traffic streams on secure wireless networks has also been studied. Through numerical results obtained from the testbed, we have presented quantitative and realistic findings for both security mechanisms as well as network performance. The tradeoff between the strength of the security protocol and the associated performance is analyzed through computer simulation results. The present real time analysis enables the network designers to make intelligent choices about the implementation of security features and the perceived network performance for a given application scenario.
... Between 2005 and 2011, computer and IT security threats to educational institutions increased considerably (Maskari, Saini, Raut, & Hadimani, 2011). One reason for the increase in threats and vulnerabilities was the evolution of wireless networking found on many college campuses and gave rise to serious security issues (Likhar, Yadav, & Keshava, 2011). With the increase in IT security threats and intrusions during the first decade of the 21st century, it was critical that IT departments developed a comprehensive security program (Liu & Ormaner, 2009). ...
... Between 2005 and 2011, computer and IT security threats to educational institutions increased considerably (Maskari, Saini, Raut, & Hadimani, 2011). One reason for the increase in threats and vulnerabilities was the evolution of wireless networking found on many college campuses and gave rise to serious security issues (Likhar, Yadav, & Keshava, 2011). ...
... Much attention is being given to the many portable devices such as smartphones, tablets, and laptops that are being used to access the academic institution's networks. One reason for the increase in threats and vulnerabilities was the evolution of wireless networking found on many college campuses and gave rise to many serious security issues (Likhar, Yadav, & Keshava, 2011). ...
Article
Full-text available
Rapid technological expansion and data collection have afforded previously unknown access to customer specifics, ranging from buying habits to medical and credit information, allowing for personalized schema producing a better, more effective relationship. However, this comes at a price of unintended release of private information, both illegal and certainly unethical. Numerous examples of data leaks and exposure of private information to external sources abound currently. Protection of this data falls squarely under the control of MIS/IT and IS in the firm and is the gatekeeper of control. An ethical framework for decision makers in organizations is required for company-wide control of the flow, release and retention of private information-both internally and externally. This ethical framework can serve as the baseline to determine effective controls for the organization to follow, using MIS/IT/IS as the control point. The paper discusses these needs and builds an initial construct model for review.
... By using UDP as the underlying transport protocol, we maintain the main properties of the link (loss, RTT variance, etc.) except for the MTU[23]. ...
Conference Paper
Full-text available
Transport protocols that can exploit multiple paths, especially MPTCP, do not match the requirements of video streaming: high average transmission delay, too strict reliability, and frequent head-of-line phenomenons resulting in abrupt throughput drops. In this paper, we address this mismatch by introducing a cross-layer scheduler, which leverages information from both application and transport layers to re-order the transmission of data and prioritize the most significant parts of the video. Our objective is to maximize the amount of video data that is received in time at the client. We show that current technologies enable the implementation of this cross-layer scheduler without much overhead. We then demonstrate the validity of our approach by studying the performance of an optimal cross-layer scheduler. The gap between the performance of the traditional scheduler versus the optimal scheduler justifies our motivation to implement a cross-layer scheduler in practice. We propose one implementation with basic cross-layer awareness. To evaluate the performance of our proposal, we aggregate a dataset of real MPTCP sessions and we use video stream encoded with HEVC. Our results show that our cross-layer proposal outperforms the traditional scheduler. Viewers not only benefit from the inherent advantages of using MPTCP (such as a better resilience to path failure) but also get a better QoE compared to the traditional scheduler.