Study And Performance Evaluation Of Security-Throughput Tradeoff With Link Adaptive Encryption Scheme

With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sensitive to channel error as well. Therefore, security for data transmission over wireless channel results in throughput loss. Trade-off between security and throughput is always a major concern in wireless networks. In this paper, a Link Adaptive Encryption scheme is evaluated that adapts to channel variations and enhances the security level of WLANs without making any compromise with the network performance. Numerical results obtained through simulation are compared with the fixed block length encryption technique in two different modes of operation- Electronic Code Book (ECB) & Cipher Block Chaining (CBC). Optimal block length is also computed, which is assumed to be the effective strength of the cipher. It has been observed that security attained with link adaptive scheme operating in ECB mode of cipher is a better solution for security and throughput trade-off. However, it is found that if computational security is a major concern, link adaptive scheme in CBC mode should be preferred.

[1]  Rajarathnam Chandramouli,et al.  Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[2]  William C. Barker,et al.  TECHNOLOGY ADMINISTRATION , 2004 .

[3]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[4]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[5]  Rajarathnam Chandramouli,et al.  On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries , 2006, ACNS.

[6]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[7]  Elaine B. Barker,et al.  Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , 2004 .

[8]  Nilufar Baghaei,et al.  IEEE 802.11 wireless LAN security performance using multiple clients , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[9]  Seymour Stein,et al.  Fading Channel Issues in System Engineering , 1987, IEEE J. Sel. Areas Commun..

[10]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[11]  Jian Sun,et al.  A novel throughput optimization approach in wireless systems , 2010, 2010 IEEE 12th International Conference on Communication Technology.

[12]  D. McGrew,et al.  The Galois/Counter Mode of Operation (GCM) , 2005 .

[13]  Kazukuni Kobara,et al.  On the Impact of Security on the Latency in WLAN 802.11b: Analytical Study , 2005 .

[14]  P. Krishnamurthy,et al.  Analysis of tradeoffs between security strength and energy savings in security protocols for WLANs , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[15]  A. Goldsmith,et al.  Variable-rate variable-power MQAM for fading channels , 1996, Proceedings of Vehicular Technology Conference - VTC.

[16]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[17]  Mohammed Boulmalf,et al.  On the Impact of Security on the Performance of WLANs , 2007, J. Commun..

[18]  David G. Messerschmitt,et al.  The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks , 2001, MMNS.

[19]  Rajarathnam Chandramouli,et al.  Robust encryption for secure image transmission over wireless channels , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[20]  H. Imai,et al.  On the impact of security on latency in WLAN 802.11b , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..