International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Design and Security Simulation of Wi-Fi Networks

Author NameAuthor Details

Shaldon Leparan Suntu, Obadia Kyetuza Bishoge

Shaldon Leparan Suntu[1]

Obadia Kyetuza Bishoge[2]

[1]School of Information and Communication Engineering, University of Science and Technology Beinjing, China

[2]School of Energy and Environmental Engineering, University of Science and Technology Beinjing, China


Wireless networks milieu is sprouting into the market, and it is the principal way of accessing the internet. Design and security of these networks for an organization need to be considered to ensure mobility is accomplished. In this study simulation results of 802.1X with flexible authentication via secure tunnelling was performed. Opportunistic key caching which is preferred by many vendors was used transit the session information from the posterior access point to the prior access point to minimize the hand-off latency to allow continuous connectivity to avoid poor network performance. The simulation process was applied throughout the write up of this article without setting up the pricy real lab-test. After the successful modelling of the network, the outcome will be transferred to the real-life environment. The network simulator software was used to illustrate roaming while Cisco Packet Tracer was engaged in the layout design of the wireless nodes. This research applies to network administrators and engineers worldwide to save time and the cost of the network appliances.

Index Terms





EAP Types




  1. 1.
    B. R. Nishanth, B. Ramakrishnan, and M. Selvi, "Improved Signcryption Algorithm for Information Security in Networks", Int. J. Comput. Networks Appl., vol. 2, no. 3, pp. 151-157, 2015.
  2. 2.
    J. Bilger, H. Cosand, N. Singh, and J. Xavier, "Security and Legal Implications of Wireless Networks , Protocols , and Devices 2 . Introduction to Wireless Networking," pp. 1-52, 2005.
  3. 3.
    E. Tews and M. Beck, "Practical attacks against WEP and WPA," Proc. Second ACM Conf. Wirel. Netw. Secur. - WiSec -09, pp. 79-83, 2009.
  4. 4.
    U. Kumar and S. Gambhir, "A Literature Review of Security Threats to Wireless Networks," Inernational J. Futur. Gener. Commun. Netw., vol. 7, no. 4, pp. 25-34, 2014.
  5. 5.
    A. Chiornita, L. Gheorghe, and D. Rosner, "A practical analysis of EAP authentication methods," 9th RoEduNet IEEE Int. Conf., pp. 31-35, 2010.
  6. 6.
    Q. Qiongfen and L. Chunlin, "On Authentication System Based on 802.1X Protocol in LAN," pp. 2-5, 2010.
  7. 7.
    J. Lazaro, A. Astarloa, U. Bidarte, J. Jimenez, and A. Zuloaga, "AES-Galois Counter Mode Encryption/Decryption FPGA Core for Industrial and Residential Gigabit Ethernet Communications," in Proceedings of the 5th International Workshop on Reconfigurable Computing: Architectures, Tools and Applications, 2009, pp. 312-317.
  8. 8.
    W. Alliance, "The State of Wi-Fi Security," no. January, pp. 3-15, 2012.
  9. 9.
    C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, "Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset," IEEE Commun. Surv. Tutorials, vol. 18, no. 1, pp. 184-208, 2016.
  10. 10.
    A. Laing, "The Security Mechanism for IEEE 802.11 Wireless Networks," SANS Inst., vol. 1, no. November, p. 6, 2001.
  11. 11.
    S. Sotillo, "Extensible Authentication Protocol ( EAP ) Security Issues," Syst. Technol. East Carolina Univ., pp. 1-6, 2007.
  12. 12.
    J. Salowey, N. Cam-Winget, D. McGrew, and H. Zhou, "The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST) Status," Cisco Syst., pp. 1-64, 2007.
  13. 13.
    S. M. Hashimi and A. GŁne?, "Performance Evaluation of a Network Using Simulation Tools or Packet Tracer," IOSR J. Comput. Eng., vol. 19, no. 1, pp. 01-05, 2017.
  14. 14.
    G. F. Riley, "Using Networks Simulation in Classroom Education," Proceeding 2012 Winter Simul. Conf., pp. 2837-2841, 2012.
  15. 15.
    A. Nayyar and R. Singh, "A Comprehensive Review of Simulation Tools for Wireless Sensor Networks ( WSNs )," J. Wirel. Netw. Commun., vol. 5, no. 1, pp. 19-47, 2015.
  16. 16.
    S. Woon, E. Wu, and A. Sekercioglu, "A Simulation Model of IEEE802.11b for Performance Analysis of Wireless (LAN) Protocols," Proc. Aust. Telecommun. Networks Appl. Conf., pp. 1-4, 2003.
  17. 17.
    B. Aslam, M. Akhlaq, and S. A. Khan, "IEEE 802 . 11 Wireless Network Simulator Using Verilog," Proc. 11th WSEAS Int. Conf. Commun., vol. 2, pp. 393-398, 2007.
  18. 18.
    M. A. Catur Bhakti, A. Abdullah, and L. T. Jung, "EAP-based authentication with EAP method selection mechanism," 2007 Int. Conf. Intell. Adv. Syst. ICIAS 2007, no. December, pp. 393-396, 2007.
  19. 19.
    K. Yang and J. Ma, "Implementation of IEEE802.1x in OPNET," 2008 Asia Simul. Conf. - 7th Int. Conf. Syst. Simul. Sci. Comput. ICSC 2008, pp. 1390-1394, 2008.
  20. 20.
    M. H. Noshy and A. Z. Mahmoud, "Performance Comparison between LTE and WiMAX Based on Link Level Simulation," Int. J. Comput. Networks Appl., vol. 4, no. 5, pp. 121-128, 2017.
  21. 21.
    J. Pan and R. Jain, "A survey of network simulation tools: Current status and future developments," Washingt. Univ. St. Louis, Tech. Rep, pp. 1-13, 2008.
  22. 22.
    T. Jeffree, P. Congdon, and M. Seaman, IEEE Standard for Local and Metropolitan area networks - Port-Based network Access Control, Revision o. New York, USA: IEEE Computer Society, 2010.
  23. 23.
    H. W. Lee, K. Kim, W. Ryu, and B. S. Lee, "Performance of an efficient performing authentication to obtain access to public wireless LAN with a cache table," IEEE Int. Conf. Commun., vol. 5, no. c, pp. 2376-2381, 2006.
  24. 24.
    S. T. Chandel and S. Sharma, "Performance Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks," Int. J. Comput. Networks Appl., vol. 3, no. 3, p. 59, 2016.
  25. 25.
    P. Mittal, "Implementation of a Novel Protocol for Coordination of Nodes in Manet," Int. J. Comput. Networks Appl., vol. 2, no. 2, pp. 99-105, 2015.
  26. 26.
    S. Zafar, "Throughput and Delay Analysis of AODV , DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks," Int. J. Comput. Networks Appl., vol. 3, no. 2, pp. 25-31, 2016.
  27. 27.
    C. T. Clancy, A. Mishra, H. M. Shin, J. l Petroni, and Wi. A. Arbaugh, "Proactive Key Distribution Using Neighbor Graphs," IEEE Wirel. Commun., no. February, pp. 26-36, 2004.
  28. 28.
    X. Liu and A. O. Fapojuwo, "An Efficient Sim-Based Authentication and Key Distribution Method for Wireless LANS," no. May, pp. 1169-1172, 2005.
  29. 29.
    ITU-T, "Transmission Systems and Media Digital Systems and Networks," Int. Telecommun. Union, pp. 1-3, 2003.
  30. 30.
    S. Shin, A. G. Forte, A. S. Rawat, and H. Schulzrinne, "Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs," MobiWac '04 Proc. Second Int. Work. Mobil. Manag. Wirel. access Protoc., pp. 19-26, 2004.