Text compression
Error Control and Energy Consumption in Communications for Nomadic Computing
IEEE Transactions on Computers - Special issue on mobile computing
Low power error control for wireless links
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Power management techniques for mobile communication
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
PAMAS—power aware multi-access protocol with signalling for ad hoc networks
ACM SIGCOMM Computer Communication Review
Payoff adaptation of communication for distributed interactive applications
Journal of High Speed Networks - Special issue on multimedia networking
Performance impact of data compression on virtual private network transactions
LCN '00 Proceedings of the 25th Annual IEEE Conference on Local Computer Networks
Compressibility of WML and WMLScript Byte Code: Initial Results
RIDE '00 Proceedings of the 10th International Workshop on Research Issues in Data Engineering
Energy/Throughput Tradeoffs of TCP Error Control Strategies
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Mobile power management for maximum battery life in wireless communication networks
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 2
Low-power group key agreement for heterogeneous wireless networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Battery power-aware encryption
ACM Transactions on Information and System Security (TISSEC)
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices
Proceedings of the 2007 ACM symposium on Applied computing
Low-power authenticated group key agreement for heterogeneous wireless networks
International Journal of Security and Networks
Energy-efficient ID-based group key agreement protocols for wireless networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A secure energy-efficient m-banking application for mobile devices
Journal of Systems and Software
A secure and efficient communication resume protocol for secure wireless networks
DAIS'05 Proceedings of the 5th IFIP WG 6.1 international conference on Distributed Applications and Interoperable Systems
Fast and secure communication resume protocol for wireless networks
Euro-Par'05 Proceedings of the 11th international Euro-Par conference on Parallel Processing
Energy-efficient software implementation of long integer modular arithmetic
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Analysis of the power consumption of secure communication in wireless networks
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
On a framework for energy-efficient security protocols in wireless networks
Computer Communications
Hi-index | 0.00 |
In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol. Our analysis showed that data transfers during a secure wireless transaction, number and size of messages exchanged during secure session establishment and cryptographic computations used for data authentication and privacy during secure data transactions in that order are the main sources of energy consumption during a secure wireless session. We developed techniques based on information compression, session negotiation protocol optimization and hardware acceleration of crypto-mechanisms to reduce the energy consumed by a secure session. A mobile test bed was developed to verify our energy management schemes and to study the energy consumption versus security tradeoffs. Using our proposed schemes we were able to reduce the session establishment energy by more than 6. 5x and the secure data transaction energy by more than 1. 5x during data transmission and by more than 2. 5x during data reception.