Digital communications: fundamentals and applications
Digital communications: fundamentals and applications
Introduction to algorithms
Elements of information theory
Elements of information theory
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Stochastic dynamic programming and the control of queueing systems
Stochastic dynamic programming and the control of queueing systems
Dynamic Programming and Optimal Control
Dynamic Programming and Optimal Control
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Introduction to Cryptography: With Coding Theory
Introduction to Cryptography: With Coding Theory
Microwave Mobile Communications
Microwave Mobile Communications
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
End-to-end confidentiality for continuous-media applications in wireless systems
End-to-end confidentiality for continuous-media applications in wireless systems
Error Control Coding, Second Edition
Error Control Coding, Second Edition
Convex Optimization
Structured Design of Substitution-Permutation Encryption Networks
IEEE Transactions on Computers
Capacity of fading channels with channel side information
IEEE Transactions on Information Theory
Experience report: trading dependability, performance, and security through temporal decoupling
Proceedings of the 11th IFIP WG 6.1 international conference on Distributed applications and interoperable systems
Linear cryptanalysis and security tradeoff of block ciphering systems with channel errors
NSS'12 Proceedings of the 6th international conference on Network and System Security
An Exposition of Performance-Security Trade-offs in RANETs Based on Quantitative Network Models
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors and fading. For example, we note that properties such as the avalanche effect that make a block cipher secure also cause them to be sensitive to bit errors. Therefore, there is a fundamental trade-off between security and throughput in encryption based wireless security. Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we proposed a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches this paper presents the following: (a) mathematical models to capture the secuity-throughput trade-off; (b) adversary models and their effects; (c) joint encryption and modulation (single and multi-rate) optimization; (d) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors; and (e) simulation results for Rijndael cipher. We observe that opportunistic encryption produces signficant improvement in the performance compared to traditional approaches.