Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis

Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis
Notice: This research summary and analysis were automatically generated using AI technology. For absolute accuracy, please refer to the [Original Paper Viewer] below or the Original ArXiv Source.

Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdropping becomes easy and consequently a security breach may result in unauthorized access, information theft, interference and service degradation. Virtual Private Networks (VPNs) have emerged as an important solution to security threats surrounding the use of public networks for private communications. While VPNs for wired line networks have matured in both research and commercial environments, the design and deployment of VPNs for WLAN is still an evolving field. This paper presents an approach to secure IEEE 802.11g WLAN using OpenVPN, a transport layer VPN solution and its impact on performance of IEEE 802.11g WLAN.


💡 Research Summary

The paper addresses the growing security concerns associated with IEEE 802.11g wireless LANs, which, despite their widespread adoption and cost‑effectiveness, are inherently vulnerable due to the broadcast nature of radio waves. Traditional Wi‑Fi security mechanisms such as WEP, WPA, and WPA2 provide encryption and authentication but suffer from key‑management complexities, known vulnerabilities (e.g., KRACK), and limited protection against passive eavesdropping. To augment these defenses, the authors propose deploying OpenVPN—a transport‑layer, SSL/TLS‑based virtual private network—on top of the wireless infrastructure, thereby creating an additional encrypted tunnel that secures all traffic regardless of the underlying Wi‑Fi protection.

The study follows a systematic methodology. First, the architecture of OpenVPN is described in detail, covering its use of virtual TUN/TAP interfaces, TLS handshakes for key exchange, symmetric ciphers (AES‑128 and AES‑256 in CBC mode), and the choice between UDP and TCP transport. Second, a testbed is assembled consisting of a standard 802.11g access point, a client device, and a low‑end router (ARM Cortex‑A7, 600 MHz) that runs the OpenVPN server or client software. Experiments are conducted on a clear 2.4 GHz channel to minimize external interference, and both VPN‑off (plain Wi‑Fi) and VPN‑on configurations are evaluated. Third, performance metrics are defined: end‑to‑end latency, throughput, packet‑loss rate, CPU utilization, and protocol overhead introduced by the VPN headers. Tools such as iPerf3, ping, Wireshark, and system monitors are employed. Fourth, a series of measurements are taken for four scenarios: UDP‑based TUN with AES‑128, UDP‑based TUN with AES‑256, TCP‑based TUN with AES‑128, and TCP‑based TUN with AES‑256.

Results reveal that enabling OpenVPN incurs a modest throughput penalty of roughly 5 %–12 % compared with the baseline Wi‑Fi connection. This reduction is primarily due to the additional VPN header (approximately 60–80 bytes) and encryption padding, which shrink the effective payload per 802.11 frame. Latency increases are more pronounced in TCP mode (15 %–20 % higher) because of retransmission and congestion‑control mechanisms, whereas UDP mode shows a smaller rise of about 8 ms on average. Packet loss rates rise slightly (≈0.8 %) under UDP, while TCP’s built‑in recovery masks the impact on overall loss. CPU usage on the low‑end router remains below 30 % for AES‑128 and climbs by an additional 5 %–7 % when AES‑256 is used; hardware‑accelerated AES (AES‑NI) would further reduce this overhead.

The discussion interprets these findings in the context of real‑world deployments. For corporate environments or remote‑work scenarios where sensitive data traverses a Wi‑Fi network, the trade‑off of a few percent throughput loss and modest latency increase is acceptable given the substantial gain in confidentiality and integrity. The study demonstrates that even modest hardware can sustain OpenVPN without jeopardizing user experience, making it a cost‑effective security layer that can be layered on top of existing WPA2‑PSK configurations.

In conclusion, the authors confirm that OpenVPN can effectively harden IEEE 802.11g WLANs against eavesdropping and man‑in‑the‑middle attacks while imposing only limited performance degradation. They suggest future work to extend the analysis to newer Wi‑Fi standards (802.11n/ac/ax), explore hardware‑offloaded VPN processing, and investigate quality‑of‑service (QoS) management in multi‑user environments.


Comments & Academic Discussion

Loading comments...

Leave a Comment