Abstract
With the growth of the Internet, communication and network security have been the focus of much attention. In addition, deployment of resource intensive security protocols in battery-powered mobile devices has raised power consumption to a significant design basis of network design. In this paper, we propose a power-efficient secure communication restart mechanism for a wireless network and analyze the power consumed while restarting a secure communication. An experimental test bed was developed to inspect the proposed mechanism and to evaluate it in terms of power consumption relative to that of conventional secure communication restart mechanisms. Using our enhanced mechanism, we were able to reduce the power consumed during a secure communication restart by up to 60% compared with conventional restart mechanisms.
Keywords
- Power Consumption
- Secure Communication
- Mutual Authentication
- Secure Socket Layer
- Wireless Application Protocol
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
SSL 3.0 Specification, http://home.netscape.com/eng/ssl3/3-spec.htm
IPSec Working Group, http://www.ietf.org/html.charters/ipsec-charter.html
TLS Working Group, http://www.ietf.org/html.charters/tls-charter.html
WAP Froum. Wireless Transport Layer Security Spec., http://www.wapforum.org
Karri, R., Mishra, P.: Optimizing the Energy Consumed by Secure Wireless Sessions - Wireless Transport Layer Security. In: Mobile Networks and Applications, pp. 177–185. Kluwer Academic Publishers, Dordrecht (2003)
Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. IEEE Transaction on Mobile Computing 5(2), 128–143 (2005)
Karri, R., Mishra, P.: Minimizing Energy Consumption of Secure Wireless Session with QoS Constraints. In: ICC 2002, pp. 2053–2057 (2002)
Jakobsson, M., Pointcheval, D.: Mutual Authentication for Low-Powered Mobile Devices. In: Syverson, P.F. (ed.) FC 2001, vol. 2339, pp. 178–195. Springer, Heidelberg (2002)
Wong, D.S., Chan, A.H.: Mutual Authentication and Key Exchange for Low Power Wireless Communications. In: MILCOM 2002, pp. 39–43 (2002)
Kravets, R., Krishnan, R.: Power Management Techniques for Mobile Communication. In: MobiCom 1999 (1999)
Woesner, H., Ebert, J.P., Schlager, M., Wolisz, A.: Power Saving Mechanisms in Emerging Standards for Wireless LANs: The MAC-Level Prospective. IEEE Personal Communication System, 40–48 (1998)
Singh, S., Raghavendra, C.S.: PAMAS-Power Aware Multi-Access Protocol with Signaling for Ad-hoc Networks. Computer Communications Review (1998)
Mikal, P.: WTLS : The Good and Bad of WAP Security (2001), http://www.advisor.com/Articles.nsf/aid/MIKP0001
Saarinen, M.J.: Attacks against the WAP WTLS Protocols (1999), http://www.freeprotocols.org/harmOfWap/wtls.pdf
Badra, M., et al.: A New Secure Session Exchange Key Protocol for Wireless Communication. In: IEEE PIMRC 2003 (2003)
Rahman, M.G., Imai, H.: Security in Wireless Communications. In: Wireless Personal Communications, No. 22. Kluwer Academic Publishers, Dordrecht (2002)
Daemen, J., Govaerts, R., Vandewalle, J.: Resynchronization Weaknesses in Synchronous Stream Ciphers. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 159–167. Springer, Heidelberg (1994)
Nichols, R.K., Lekks, P.C.: Wireless Security - Models, Threats, and Solutions. McGraw-Hill Telecom, New York (2002)
Amoroso, E.: Fundamentals of Computer Security Technology. Prentice-Hall, Englewood Cliffs (1993)
Armknecht, F., Lano, J., Preneel, B.: Extending the Resynchronization Attack. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 19–38. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, K., Hong, J., Lim, J. (2006). Analysis of the Power Consumption of Secure Communication in Wireless Networks. In: Bressan, S., Küng, J., Wagner, R. (eds) Database and Expert Systems Applications. DEXA 2006. Lecture Notes in Computer Science, vol 4080. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11827405_87
Download citation
DOI: https://doi.org/10.1007/11827405_87
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37871-6
Online ISBN: 978-3-540-37872-3
eBook Packages: Computer ScienceComputer Science (R0)