Cross-Layer Secrecy Design on TCP/IP and 802.11 for Energy Saving

Electronic services (mail, web, etc.) can operate, at present over wireless networks. 802.11 networks are an example, where wireless devices use its resources to access to networks and services and in particular to Internet. The security mechanisms in the MAC layer are added to existing security mechanisms in other layers of the TCP/IP model, and therefore it generates multiple encryption of information. The implementation of encryption mechanisms in wireless networks consumes resources in the devices, and among others, the battery power. In a wireless terminal the battery is limited and the reduction of the number of encrypted bytes can reduce the energy consumption. In this paper we resume the security architecture in TCP/IP over IEEE 802.11 networks. Then we explain the impact of encryption mechanisms on the energy consumed in a mobile node in a case scenario. We propose a solution that eliminates redundancy in the encryption of the data at different layers applying the Cross-Layer design, we analyze the architecture for exchanging security information between layers and, finally, we propose an algorithm for security inter-layer communication and a solution for Cross-Layer signalling between nodes

[1]  Transport Layer Security Working Group , 1997 .

[2]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[3]  Helena Rifà-Pous,et al.  Cryptographic Energy Costs Are Assumable in Ad Hoc Networks , 2009, IEICE Trans. Inf. Syst..

[4]  Geethapriya Thamilarasu,et al.  Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[5]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[6]  Lang long,et al.  On cross-layer design of wireless networks , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[7]  Jorge L. V. Barbosa,et al.  Evaluating the Impact on Data Reception and Energy Consumption of Mobile Devices using IPSec to securely access WiFi Networks , 2005, LANOMS.

[8]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[9]  Panganamala Ramana Kumar,et al.  A cautionary perspective on cross-layer design , 2005, IEEE Wireless Communications.

[10]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[11]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[12]  Gustavo Carneiro,et al.  Cross-layer design in 4G wireless terminals , 2004, IEEE Wireless Communications.

[13]  M. Motani,et al.  Cross-layer design: a survey and the road ahead , 2005, IEEE Communications Magazine.

[14]  Geethapriya Thamilarasu,et al.  A Cross-layer Approach to Detect Jamming Attacks in Wireless Ad hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[15]  Roy Fielding RFC 2068 : Hypertext Transfer Protocol-HTTP/1.1 , 1997 .

[16]  Prashant Krishnamurthy,et al.  On a framework for energy-efficient security protocols in wireless networks , 2004, Comput. Commun..

[17]  Prashant Krishnamurthy,et al.  Analysis of energy consumption of RC4 and AES algorithms in wireless LANs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).