Performance evaluation of security services: An experimental approach

被引:1
作者
Cilardo, Alessandro [1 ]
Coppolino, Luigi [1 ]
Mazzeo, Antonino [1 ]
Romano, Luigi [2 ]
机构
[1] Univ Napoli Federico II, Dipartimento Informat & Sistemist, Via Claudio 21, I-80125 Naples, Italy
[2] Univ Napoli Parthenope, Dipartimento Tecnol, I-80133 Naples, Italy
来源
15TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, PROCEEDINGS | 2007年
关键词
performance; security; ubiquitous computing; mobile devices; web services;
D O I
10.1109/PDP.2007.64
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent advances in wireless technologies have enabled pervasive connectivity to Internet scale systems which include heterogeneous mobile devices, such as mobile phones and Personal Digital Assistants, a trend which is generally referred to as ubiquitous computing. This leads to the need for providing security functions to applications which are partially deployed over wireless devices. Delivering security services to mobile devices raises a number of challenging issues, mostly related to the limited amount of computing power which is typically available on the target platforms. Some promising solutions rely on multi-tier architectures, which are based on the emerging Web Services technology. In this scenario, understanding the impact of architectural characteristics of specific plalforms is a key issue for practitioners who have to develop and deploy efficient security-enabled applications on mobile devices. This paper provides an experimental study of the impact that specific characteristics of individual mobile device platforms have on the final performance of security applications. Focus is on performance and resource utilization, which are key aspects when one develops applications on mobile devices. The case study is a Web Services based solution for delivering Public Key Infrastructure (PKI) Services to Mobile Devices. Experiments have been conducted on three different mobile terminals, which span a large range of characteristics in the class of resource-constrained devices. Results show that: i) performance figures are not uniform. in spite of similar underlying hardware characteristics, and ii) security and performance are often conflicting requirements.
引用
收藏
页码:387 / +
页数:3
相关论文
共 23 条
  • [1] [Anonymous], 2401 IETF RFC
  • [2] ARGYUROUDIS P, 2003, TCDCS200346 U DUBL C
  • [3] BATINA L, 2004, ECRYPT WORKSH SASC S, P302
  • [4] *CLDC, J2ME BUILD BLOCKS MO
  • [5] Daswani N, 1999, LECT NOTES COMPUT SC, V1648, P1
  • [6] Implementing a fully distributed certificate authority in an OLSR MANET
    Dhillon, D
    Randhawa, TS
    Wang, M
    Lamont, L
    [J]. 2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 682 - 688
  • [7] DIERKS T, 1999, 2246 IETF RFC
  • [8] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [9] Securing the wireless Internet
    Gupta, V
    Gupta, S
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (12) : 68 - 74
  • [10] Hennessy J. L, 2012, COMPUTER ARCHITECTUR