Wenye Wang (王文野)
Professor, IEEE Fellow
Electrical and Computer Engineering
NC State University

STEP2 in WLANs

Objectives

Our main objective is to realize the implmentation of Self-TunEd Performance and Protection (STEP2) management system for wireless LANs. Although, the architecture of STEP2 is generalized in the way that it can be used for any kind of wireless networks, however, as a case study, we are evaluating STEP2 in wireless LAN settings. The reason is that wireless LANs are the most popular kind of wireless network deployed as hot-spots in the real world. Further, we aim to carry-out experiments in different scenarios, such as under good and poor links, with multiple clients and mobile clients settings. We plan to measure different performance parameters such as packet loss and delay in different scenarios to evaluate the usefulness of STEP2. We hope to setup the testbed and different scenarios as close to real-time as possible.

System Description

The testbed consists of a security policy server behind an access point, and many mobile clients at different locations. The server is setup as a desktop machine, which provides negotiation of security policies for clients in the wireless LANs. The server does not require any changes for implementing STEP2. The clients are laptop computers, and run STEP2 implementation. STEP2 system consists of three modules: a monitor, a decision-maker and a tuner. A brief description of these modules is as follows.

STEP2 Modules

Monitor: The monitor module collects statistics such as packet losses and delay over wireless links to measure the channel performance. The monitor module uses unicast probing technique to determine wireless channel performance between the client and the server. The monitor, then, provides the feedback to the decision-maker at regular intervals.

Decision-Maker: Whenever the decision-maker module obtains feedback from the monitoring system, it runs an algorithm to determine the decisions regarding the tuning of security policies. The monitor and decision-maker are executed as background processes so that they do not interfere with the ongoing data transmission in a system. The decision-maker sends its decision to the tuner.

Tuner: This module takes care of changing the current security policy if the decision sent by the decision-maker module includes new security policy. Since this module runs in foreground, it adds extra overhead to the ongoing data transmission. However, our implementation ensures to keep the overhead as little as possible.

Setup and Configuration

The policy server and access point are on the 3rd floor of EB2 building of the campus and are connected over wired ethernet. On the other side, clients are scattered on the 2nd and 3rd floors of the same building. The access point and clients use channel 6, and data rate has been set as 11 Mbps for all clients. The 2nd floor has a campus wireless network, however there is no wireless network on the 3rd floor except some students using their personal mobile devices. This setting helps us in obtaining measurements while having variations in the link connectivity between client and access points. As variations in link connectivity are more during afternoon due to the high flow of students, measurements are taken during afternoon as well as in nights when there are not many variations.

1. Security Policies

Currently, the testbed is configured with four IPSec security policies which are IPSec-AES-SHA1, IPSec-AES-MD5, IPSec-3DES-SHA1 and IPSec-3DES-MD5. We use Openswan implementation of IPSec in the testbed, so all details related to IPSec are specific to Openswan. In general, IPSec can be configured in tunnel and transport modes, however we have used tunnel mode configuration as it is considered stronger than the transport mode. IPSec establishes tunnels between two end points, the server and the clients in our testbed, in two phases. In the first phase, called Main Mode, cryptographic keys to be used in the second phase are generated. In the second phase, called Quick Mode, encryption and hashing algorithms are negotiated between the two end points and cryptographic keys are generated to be used for data transmission.

2. Hardware Details

The server is Dell PC with Pentium IV (2.6 GHZ). We have used Cisco Access Points (Cisco Aironet 1200 series) to provide wireless connectivity. The mobile clients are Dell Laptop with Celeron Processor (2.4GHZ). In addition, we have used Lucent orinoco gold wireless cards (802.11b) in mobile clients.

3. Software Details

All systems run Redhat Linux 9 with kernel version 2.4.20-8. Openswan open source is installed on the server and mobile clients for IPSec functionality. OpenSSL open source software is installed on all systems to be used by IPSec protocol suite. Iperf, Ping and Rude are used for generating different traffics, such as TCP and UDP.

Useful Links

If you have any question, please feel free to contact Avesh Agarwal.

Recent Activities

2020 - Tutorial Co-Chair, Technical Program Committee, IEEE ICC 2020

2019 - Area Chair, Technical Program Committee, IEEE INFOCOM

2018 - Area Chair, Technical Program Committee, IEEE INFOCOM

More activities »
News
August, 2020

Congratulations to our team on receiving an NSF award!

July, 2020

Congratulations on Rui's presentation in IEEE INFOCOM Virtual Meeting!

More news »
Our Calendar