ACM Transactions on Computer Systems (TOCS)
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Adaptive link layer strategies for energy efficient wireless networking
Wireless Networks
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Software implementation strategies for power-conscious systems
Mobile Networks and Applications
A Survey of Energy Efficient Network Protocols for Wireless Networks
Wireless Networks
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Mobile Networks and Applications - Security in mobile computing environments
Design Space Exploration for Energy-Efficient Secure Sensor Network
ASAP '02 Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors
Battery-Driven System Design: A New Frontier in Low Power Design
ASP-DAC '02 Proceedings of the 2002 Asia and South Pacific Design Automation Conference
Your 80211 wireless network has no clothes
IEEE Wireless Communications
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
Kerberos: an authentication service for computer networks
IEEE Communications Magazine
SecVLC: secure transmission over multimedia wireless ad hoc networks with energy-awareness
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
An energy efficient security protocol for IEEE 802.11 WLANs
Pervasive and Mobile Computing
Anomaly detection and mitigation for disaster area networks
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Hi-index | 0.24 |
Network security is an important issue especially in wireless networks where the network is open and the network perimeter is not exactly known. This makes wireless networks more vulnerable to attacks such as eavesdropping, message interception and modifications. Several security protocols designed for wired-line networks have been adopted for use in wireless networks. However, they may not be suitable for wireless networks and devices since scenarios and capabilities applicable to wired-line networks may not be valid in wireless networks. For example, wireless devices often have limited battery power, and performing several message exchanges used in typical wired-line security protocols may rapidly deplete the devices' battery. Cryptographic primitives consume energy and could degrade the battery performance of wireless networks. In this paper, we classify energy saving mechanisms for security protocols in wireless networks. We apply these energy saving mechanisms to existing security protocols and demonstrate the reduction in energy consumption that is possible with the suggested approaches.