Data networks
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
The Design of Rijndael
On virtual private networks security design issues
Computer Networks: The International Journal of Computer and Telecommunications Networking
Introduction to 3G Mobile Communications
Introduction to 3G Mobile Communications
A Study of the Relative Costs of Network Security Protocols
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference
Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter
ASAP '02 Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors
Analyzing and modeling encryption overhead for sensor network nodes
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
Information Processing Letters - Devoted to the rapid publication of short contributions to information processing
Experimental evaluation of community-based WLAN voice and data services
Proceedings of the 3rd international conference on Mobile multimedia communications
A network-assisted mobile VPN for securing users data in UMTS
Computer Communications
Queueing Analysis for Networks Under DoS Attack
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fine tuning the advanced encryption standard (AES)
Proceedings of the Fifth International Conference on Security of Information and Networks
Hi-index | 0.00 |
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range of different cryptographic algorithms are used in conjunction with IPsec, such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), Message Digest (MD5) and Secure Hash Algorithm 1 (SHA-1). We consider the processing and packetization overheads introduced by these algorithms and quantify their impact in terms of communication quality (added delay for the end-user) and resource consumption (additional bandwidth on the radio interface). We conduct a quantitive analysis based on a detailed simulation model of an IPsec enabled handheld device. We verify our simulation results by comparing against analytic results obtained from an approximate analytic model.