Advertisement

Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks

  • Ramesh Karri
  • Piyush Mishra
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2799)

Abstract

Traditionally, researchers have focused on security, complexity, and throughput metrics while designing security protocols for wired networks. Deployment of these security protocols in battery-powered mobile devices has elevated energy consumption into an important design metric. In this paper we study the energy consumption characteristics of secure session negotiation protocols used by IPSec and WTLS protocols. Based on this study we present techniques to optimize energy consumed by secure wireless session negotiation protocols. Proposed techniques achieve 4× to 32× energy savings without compromising the security of wireless sessions. We show that these techniques are platform independent and discuss the impact of platform specific characteristics, such as available system resources, on the presented techniques.

Keywords

Shared Secret Security Protocol Mutual Authentication Mobile Client Session Negotiation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Karri, R., Mishra, P.: Optimizing the energy consumed by secure wireless session -Wireless Transport Layer Security case study. Journal of Mobile Networks and Applications 8(2), 177–185 (2003)CrossRefGoogle Scholar
  2. 2.
    Woesner, H., Ebert, J.P., Schlager, M., Wolisz, A.: Power saving mechanisms in emerging standards for wireless LANs: The MAC-level perspective. IEEE Personal Communication Systems, 40–48 (1998)Google Scholar
  3. 3.
    Ebert, J., Stremmel, B., Wiederhold, E., Wolisz, A.: An energy-efficient power control approach for WLANs. Journal of Communications and Networks 2, 197–206 (2000)Google Scholar
  4. 4.
    Rulnick, J.M., Bambos, N.: Mobile power management for maximum battery life in wireless communications network. In: Proceedings, IEEE ICC, March 1996, vol. 2, pp. 443–450 (1996)Google Scholar
  5. 5.
    Kravets, R., Krishnan, P.: Power management techniques for mobile communication. In: Proceedings, ACM/IEEE MOBICOM (August 1999)Google Scholar
  6. 6.
    Rohl, C., Woesner, H., Wolisz, A.: A short look on power saving mechanisms in the wireless LAN standard draft IEEE 802.11. In: Advances in Wireless Communications. Kluwer Academic Publishers, Dordrecht (1998)Google Scholar
  7. 7.
    Singh, S., Raghavendra, C.S.: PAMAS-Power Aware Multi-Access Protocol with signaling for ad-hoc networks. Computer Communications Review (July 1998)Google Scholar
  8. 8.
    Zorzi, M., Rao, R.R.: Energy constrained error control for wireless channels. IEEE Personal Communications 4, 27–33 (1997)CrossRefGoogle Scholar
  9. 9.
    Lettieri, P., Fragouli, C., Srivastava, M.B.: Low power error control for wireless links. In: Proceedings, ACM/IEEE MOBICOM, August 1997, pp. 139–150 (1997)Google Scholar
  10. 10.
  11. 11.
    Wireless Transport Layer Security Specification, http://www.wapforum.org
  12. 12.
    The Internet Key Exchange Protocol, http://www.ietf.org/rfc/rfc2409.txt
  13. 13.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)CrossRefMathSciNetGoogle Scholar
  14. 14.
    Cheng, P.C.: An architecture for the Internet Key Exchange Protocol. IBM Systems Journal 40(3), 721–746 (2001)CrossRefGoogle Scholar
  15. 15.
    Karri, R., Mishra, P.: Modeling energy efficient secure wireless networks using network simulation. In: Proceedings, IEEE ICC, May 2003, vol. 1, pp. 61–65 (2003)Google Scholar
  16. 16.
    DEFLATE Compressed Data Format Specification version 1.3, http://www.kblabs.com/lab/lib/rfcs
  17. 17.
    Bell, T.C.: Text compression. Prentice Hall, Englewood Cliffs (1990)Google Scholar
  18. 18.
    Rivest, R.L., Shamir, A., Adelman, L.M.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Ramesh Karri
    • 1
  • Piyush Mishra
    • 1
  1. 1.Department of Electrical and Computer EngineeringPolytechnic UniversityBrooklyn

Personalised recommendations