Abstract
Traditionally, researchers have focused on security, complexity, and throughput metrics while designing security protocols for wired networks. Deployment of these security protocols in battery-powered mobile devices has elevated energy consumption into an important design metric. In this paper we study the energy consumption characteristics of secure session negotiation protocols used by IPSec and WTLS protocols. Based on this study we present techniques to optimize energy consumed by secure wireless session negotiation protocols. Proposed techniques achieve 4× to 32× energy savings without compromising the security of wireless sessions. We show that these techniques are platform independent and discuss the impact of platform specific characteristics, such as available system resources, on the presented techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Karri, R., Mishra, P.: Optimizing the energy consumed by secure wireless session -Wireless Transport Layer Security case study. Journal of Mobile Networks and Applications 8(2), 177–185 (2003)
Woesner, H., Ebert, J.P., Schlager, M., Wolisz, A.: Power saving mechanisms in emerging standards for wireless LANs: The MAC-level perspective. IEEE Personal Communication Systems, 40–48 (1998)
Ebert, J., Stremmel, B., Wiederhold, E., Wolisz, A.: An energy-efficient power control approach for WLANs. Journal of Communications and Networks 2, 197–206 (2000)
Rulnick, J.M., Bambos, N.: Mobile power management for maximum battery life in wireless communications network. In: Proceedings, IEEE ICC, March 1996, vol. 2, pp. 443–450 (1996)
Kravets, R., Krishnan, P.: Power management techniques for mobile communication. In: Proceedings, ACM/IEEE MOBICOM (August 1999)
Rohl, C., Woesner, H., Wolisz, A.: A short look on power saving mechanisms in the wireless LAN standard draft IEEE 802.11. In: Advances in Wireless Communications. Kluwer Academic Publishers, Dordrecht (1998)
Singh, S., Raghavendra, C.S.: PAMAS-Power Aware Multi-Access Protocol with signaling for ad-hoc networks. Computer Communications Review (July 1998)
Zorzi, M., Rao, R.R.: Energy constrained error control for wireless channels. IEEE Personal Communications 4, 27–33 (1997)
Lettieri, P., Fragouli, C., Srivastava, M.B.: Low power error control for wireless links. In: Proceedings, ACM/IEEE MOBICOM, August 1997, pp. 139–150 (1997)
IP Security protocol (IPSec), http://www.ietf.org/html.charters/ipsec-charter.html
Wireless Transport Layer Security Specification, http://www.wapforum.org
The Internet Key Exchange Protocol, http://www.ietf.org/rfc/rfc2409.txt
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
Cheng, P.C.: An architecture for the Internet Key Exchange Protocol. IBM Systems Journal 40(3), 721–746 (2001)
Karri, R., Mishra, P.: Modeling energy efficient secure wireless networks using network simulation. In: Proceedings, IEEE ICC, May 2003, vol. 1, pp. 61–65 (2003)
DEFLATE Compressed Data Format Specification version 1.3, http://www.kblabs.com/lab/lib/rfcs
Bell, T.C.: Text compression. Prentice Hall, Englewood Cliffs (1990)
Rivest, R.L., Shamir, A., Adelman, L.M.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Karri, R., Mishra, P. (2003). Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks. In: Chico, J.J., Macii, E. (eds) Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation. PATMOS 2003. Lecture Notes in Computer Science, vol 2799. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39762-5_42
Download citation
DOI: https://doi.org/10.1007/978-3-540-39762-5_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20074-1
Online ISBN: 978-3-540-39762-5
eBook Packages: Springer Book Archive