Skip to main content

Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks

  • Conference paper
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation (PATMOS 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2799))

  • 1068 Accesses

Abstract

Traditionally, researchers have focused on security, complexity, and throughput metrics while designing security protocols for wired networks. Deployment of these security protocols in battery-powered mobile devices has elevated energy consumption into an important design metric. In this paper we study the energy consumption characteristics of secure session negotiation protocols used by IPSec and WTLS protocols. Based on this study we present techniques to optimize energy consumed by secure wireless session negotiation protocols. Proposed techniques achieve 4× to 32× energy savings without compromising the security of wireless sessions. We show that these techniques are platform independent and discuss the impact of platform specific characteristics, such as available system resources, on the presented techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Karri, R., Mishra, P.: Optimizing the energy consumed by secure wireless session -Wireless Transport Layer Security case study. Journal of Mobile Networks and Applications 8(2), 177–185 (2003)

    Article  Google Scholar 

  2. Woesner, H., Ebert, J.P., Schlager, M., Wolisz, A.: Power saving mechanisms in emerging standards for wireless LANs: The MAC-level perspective. IEEE Personal Communication Systems, 40–48 (1998)

    Google Scholar 

  3. Ebert, J., Stremmel, B., Wiederhold, E., Wolisz, A.: An energy-efficient power control approach for WLANs. Journal of Communications and Networks 2, 197–206 (2000)

    Google Scholar 

  4. Rulnick, J.M., Bambos, N.: Mobile power management for maximum battery life in wireless communications network. In: Proceedings, IEEE ICC, March 1996, vol. 2, pp. 443–450 (1996)

    Google Scholar 

  5. Kravets, R., Krishnan, P.: Power management techniques for mobile communication. In: Proceedings, ACM/IEEE MOBICOM (August 1999)

    Google Scholar 

  6. Rohl, C., Woesner, H., Wolisz, A.: A short look on power saving mechanisms in the wireless LAN standard draft IEEE 802.11. In: Advances in Wireless Communications. Kluwer Academic Publishers, Dordrecht (1998)

    Google Scholar 

  7. Singh, S., Raghavendra, C.S.: PAMAS-Power Aware Multi-Access Protocol with signaling for ad-hoc networks. Computer Communications Review (July 1998)

    Google Scholar 

  8. Zorzi, M., Rao, R.R.: Energy constrained error control for wireless channels. IEEE Personal Communications 4, 27–33 (1997)

    Article  Google Scholar 

  9. Lettieri, P., Fragouli, C., Srivastava, M.B.: Low power error control for wireless links. In: Proceedings, ACM/IEEE MOBICOM, August 1997, pp. 139–150 (1997)

    Google Scholar 

  10. IP Security protocol (IPSec), http://www.ietf.org/html.charters/ipsec-charter.html

  11. Wireless Transport Layer Security Specification, http://www.wapforum.org

  12. The Internet Key Exchange Protocol, http://www.ietf.org/rfc/rfc2409.txt

  13. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  14. Cheng, P.C.: An architecture for the Internet Key Exchange Protocol. IBM Systems Journal 40(3), 721–746 (2001)

    Article  Google Scholar 

  15. Karri, R., Mishra, P.: Modeling energy efficient secure wireless networks using network simulation. In: Proceedings, IEEE ICC, May 2003, vol. 1, pp. 61–65 (2003)

    Google Scholar 

  16. DEFLATE Compressed Data Format Specification version 1.3, http://www.kblabs.com/lab/lib/rfcs

  17. Bell, T.C.: Text compression. Prentice Hall, Englewood Cliffs (1990)

    Google Scholar 

  18. Rivest, R.L., Shamir, A., Adelman, L.M.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karri, R., Mishra, P. (2003). Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks. In: Chico, J.J., Macii, E. (eds) Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation. PATMOS 2003. Lecture Notes in Computer Science, vol 2799. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39762-5_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39762-5_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20074-1

  • Online ISBN: 978-3-540-39762-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics