On a framework for energy-efficient security protocols in wireless networks

被引:21
作者
Prasithsangaree, P [1 ]
Krishnamurthy, P [1 ]
机构
[1] Univ Pittsburgh, Sch Informat Sci, Telecommun Program, Pittsburgh, PA 15260 USA
关键词
energy efficiency; security protocol; wireless networks; energy consumption; adaptive security;
D O I
10.1016/j.comcom.2004.05.022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security is an important issue especially in wireless networks where the network is open and the network perimeter is not exactly known. This makes wireless networks more vulnerable to attacks such as eavesdropping, message interception and modifications. Several security protocols designed for wired-line networks have been adopted for use in wireless networks. However, they may not be suitable for wireless networks and devices since scenarios and capabilities applicable to wired-line networks may not be valid in wireless networks. For example, wireless devices often have limited battery power, and performing several message exchanges used in typical wired-line security protocols may rapidly deplete the devices' battery. Cryptographic primitives consume energy and could degrade the battery performance of wireless networks. In this paper, we classify energy saving mechanisms for security protocols in wireless networks. We apply these energy saving mechanisms to existing security protocols and demonstrate the reduction in energy consumption that is possible with the suggested approaches. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:1716 / 1729
页数:14
相关论文
共 56 条
  • [1] Abadi M., 1991, Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, P201, DOI 10.1145/112600.112618
  • [2] ABADI M, 2000, FDN SECURE COMPUTATI
  • [3] ABOBA B, 1999, 2716 IETF
  • [4] ANDERSON R, 1995, LECT NOTES COMPUTER, V1000
  • [5] [Anonymous], EXTENSIBLE AUTHENTIC
  • [6] [Anonymous], 2001, INTERCEPTING MOBILE
  • [7] [Anonymous], 2002, PRINCIPLES WIRELESS
  • [8] ARBAUGH WA, 2001, P 1 IEEE INT C WIR L, P131
  • [9] BIHAM E, 1991, J CRYPTOL, V4, P3, DOI DOI 10.1007/BF00630563
  • [10] BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]