Opportunistic encryption: A trade-off between security and throughput in wireless networks

被引:54
作者
Haleem, Mohamed A. [1 ]
Mathur, Chetan N. [1 ]
Chandramouli, R. [1 ]
Subbalakshmi, K. P. [1 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
基金
美国国家科学基金会;
关键词
stochastic optimization; encryption; wireless security;
D O I
10.1109/TDSC.2007.70214
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security. 1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities ( acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation ( single and multirate), 4) the use of Forward Error Correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.
引用
收藏
页码:313 / 324
页数:12
相关论文
共 28 条
[1]   Battery power optimized encryption [J].
Bapatla, S ;
Chandramouli, R .
2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, :3802-3806
[2]  
Bertsekas DP, 2012, DYNAMIC PROGRAMMING, V2
[3]  
Boyd S., 2004, CONVEX OPTIMIZATION
[4]   Channel estimation techniques based on pilot arrangement in OFDM systems [J].
Coleri, S ;
Ergen, M ;
Puri, A ;
Bahai, A .
IEEE TRANSACTIONS ON BROADCASTING, 2002, 48 (03) :223-229
[5]  
Cormen TH, 2003, INTRO ALGORITHMS
[6]  
Cover TM, 2006, Elements of Information Theory
[7]  
DAEMEN J, 2006, AES PROPOSAL RIJNDAE
[8]   Variable-rate variable-power MQAM for fading channels [J].
Goldsmith, AJ ;
Chua, SG .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1997, 45 (10) :1218-1230
[9]   Capacity of fading channels with channel side information [J].
Goldsmith, AJ ;
Varaiya, PP .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1997, 43 (06) :1986-1992
[10]  
Jakes W.C., 1975, MICROWAVE MOBILE COM