Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Design and implementation of a scalable encryption processor with embedded variable DC/DC converter
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Architectural support for fast symmetric-key cryptography
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
System design methodologies for a wireless security processing platform
Proceedings of the 39th annual Design Automation Conference
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Performance analysis of elliptic curve cryptography for SSL
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Mutual Authentication for Low-Power Mobile Devices
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Bit Permutation Instructions for Accelerating Software Cryptography
ASAP '00 Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors
An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems
MASCOTS '99 Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
The Performance Measurement of Cryptographic Primitives on Palm Devices
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Securing electronic commerce: reducing the SSL overhead
IEEE Network: The Magazine of Global Internetworking
Denial-of-service resilience password-based group key agreement for wireless networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
International Journal of Security and Networks
A network-assisted mobile VPN for securing users data in UMTS
Computer Communications
Analysis and design of a hardware/software trusted platform module for embedded systems
ACM Transactions on Embedded Computing Systems (TECS)
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
Energy Analysis of Multimedia Video Streaming on Mobile Devices
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Negotiation of security services: a multi-criteria decision approach
WESS '09 Proceedings of the 4th Workshop on Embedded Systems Security
Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
A study of the performance of SSL on PDAs
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Energy aware data management on AVR micro controller based systems
ACM SIGSOFT Software Engineering Notes
Stimulating cooperation in multi-hop wireless networks using cheating detection system
INFOCOM'10 Proceedings of the 29th conference on Information communications
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Event handoff unobservability in WSN
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Prevention of wormhole attacks in mobile commerce based on non-infrastructure wireless networks
Electronic Commerce Research and Applications
Energy Measurement and Analysis of Security Algorithms for Embedded Systems
GREENCOM '11 Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications
An efficient ID-Based bilinear key predistribution scheme for distributed sensor networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
μTESLA-based secure routing protocol for wireless sensor networks
Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies
Analysis of the power consumption of secure communication in wireless networks
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
An approach for detection of malicious node using fuzzy based trust levels in MANET
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
International Journal of Network Management
Towards implementing a fully wireless multiple-lead electrocardiograph
Proceedings of the Fifth International Conference on Body Area Networks
A new dynamic ID-Based remote user authentication scheme with forward secrecy
APWeb'12 Proceedings of the 14th international conference on Web Technologies and Applications
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
An empirical energy model for secure Web browsing over mobile devices
Security and Communication Networks
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks
International Journal of Security and Networks
Designing Security Properties-Centric Communication Protocols using a Component-Based Approach
International Journal of Distributed Systems and Technologies
LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload
ACM Transactions on Internet Technology (TOIT)
Measurement-based research on cryptographic algorithms for embedded real-time systems
Journal of Systems Architecture: the EUROMICRO Journal
Hi-index | 0.00 |
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices—battery life—and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.