Wireless Transmission Energy Analysis for Interference-Aware and Confidentiality-Enhanced Multipath Routing

被引:1
作者
Lee, Chung-wei [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Springfield, IL USA
来源
2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS | 2009年
关键词
security; energy; wireless; routing; multipath;
D O I
10.1109/NCA.2009.58
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Two of the most important concerns in today's wireless network systems and mobile devices are communication security and energy consumption. Most of the time, wireless system designers treat these two issues separately, which usually results in a non-optimized final product. In general, the more security features a system uses, the more energy it consumes. While it is arguable about what an optimized system is, it is certainly beneficial to study the details of these tradeoffs which can provide insights into the design in the future. In this paper, we investigate the tradeoffs between the energy and security when the wireless multi-hop routing involves confidentiality-enhanced multipath routing and radio interference-aware routing. Intuitively, if multipath routing is employed to enhance data confidentiality, the overall energy consumption increases because more mobile device antennas become active on multiple paths and they raise up the radio interference level. However, as our study shows, while high-density wireless networks suffer from high energy problems when strong confidentiality is supported by multipath routing, employing radio propagation directionality properly can provide both enhanced security and reduced energy consumption at a reasonable level.
引用
收藏
页码:122 / 125
页数:4
相关论文
共 10 条
[1]  
[Anonymous], NETWORK SIMULATOR NS
[2]  
GUMMADI R, ACM SIGCOMM 2007
[3]  
HONG X, 2008, MILCOM
[4]  
Jain K., 2003, ACM MOBICOM 2003
[5]  
LI F, INTERFERENCE AWARE M
[6]  
Lou WJ, 2004, IEEE INFOCOM SER, P2404
[7]  
Pahlavan K., 2002, PRINCIPLES WIRELESS
[8]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[9]  
SUBRAMANIAN A, 2006, INTERFERENCE AWARE R
[10]  
Zhang J, 2008, IEEE INFOCOM SER, P306