Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Design and implementation of a scalable encryption processor with embedded variable DC/DC converter
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Architectural support for fast symmetric-key cryptography
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
System design methodologies for a wireless security processing platform
Proceedings of the 39th annual Design Automation Conference
Performance analysis of elliptic curve cryptography for SSL
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Mutual Authentication for Low-Power Mobile Devices
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Bit Permutation Instructions for Accelerating Software Cryptography
ASAP '00 Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors
An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems
MASCOTS '99 Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
The Performance Measurement of Cryptographic Primitives on Palm Devices
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Securing electronic commerce: reducing the SSL overhead
IEEE Network: The Magazine of Global Internetworking
Emerging challenges in designing secure mobile appliances
Ambient intelligence
Proceedings of the 41st annual Design Automation Conference
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks
Wireless Personal Communications: An International Journal
Performance evaluation of public key-based authentication in future mobile communication systems
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
From digital audiobook to secure digital multimedia-book
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Battery power-aware encryption
ACM Transactions on Information and System Security (TISSEC)
Location privacy in wireless personal area networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Energy evaluation of software implementations of block ciphers under memory constraints
Proceedings of the conference on Design, automation and test in Europe
Cross-layer verification of type flaw attacks on security protocols
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
Information Sciences: an International Journal
International Journal of Distributed Sensor Networks
ESecRout: An Energy Efficient Secure Routing for Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Delay aware, reconfigurable security for embedded systems
Proceedings of the ICST 2nd international conference on Body area networks
Adaptive Optimizations for Surveillance Sensor Network Longevity
International Journal of Distributed Sensor Networks
Energy Analysis of Multimedia Video Streaming on Mobile Devices
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Energy analysis of multimedia video decoding on mobile handheld devices
Computer Standards & Interfaces
The energy cost of SSL in deeply embedded systems
The energy cost of SSL in deeply embedded systems
A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks
Computer Communications
Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks
Electronic Commerce Research
A testbed for energy profile characterization of IP services in smartphones over live networks
Mobile Networks and Applications
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
Energy efficient watermarking on mobile devices using proxy-based partitioning
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Security improvement on a group key exchange protocol for mobile networks
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
Improved pairing protocol for bluetooth
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Formal verification of a type flaw attack on a security protocol using object-z
ZB'05 Proceedings of the 4th international conference on Formal Specification and Development in Z and B
Energy-efficient software implementation of long integer modular arithmetic
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Forward secure communication in wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Mobile music distribution: a multichannel approach
Advances in Multimedia
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks
International Journal of Security and Networks
Efficient and secure credit card payment protocol for mobile devices
International Journal of Information and Computer Security
A reversible watermarking authentication scheme for wireless sensor networks
Information Sciences: an International Journal
TSV: A novel energy efficient Memory Integrity Verification scheme for embedded systems
Journal of Systems Architecture: the EUROMICRO Journal
Hi-index | 0.00 |
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired Internet, many new challenges arise due to the unique characteristics of battery powered embedded systems. In this work, we focus on an important constraint of such devices -- battery life -- and examine how it is impacted by the use of security protocols.We present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that are used as building blocks in security protocols. Furthermore, we study the energy consumption requirements of the most popular transport-layer security protocol SSL (Secure Sockets Layer). To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless LAN and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parametrizable SSL client and server test programs. We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on overall energy consumption for secure data transactions.Based on our results, we discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step towards addressing the challenges of energy efficient security for battery-constrained systems.