Analysis of tradeoffs between security strength and energy savings in security protocols for WLANs

Energy sayings are extremely important in wireless networks where devices operate using battery power. Security in wireless networks is also becoming crucial with the deployment of wireless local area networks in hot spot areas, organizations, hospitals and so on. Security protocols depend on energy consuming operations that occur in the cryptographic primitives used in the protocols. It has been observed that different cryptographic algorithms consume different amounts of energy. Also, the amount of energy consumed can depend on the key size, the number of cryptographic operational rounds, and packet or frame size. At the same time, the strength of a security protocol also depends on the key sizes and ciphers used to build it. We apply these results to protocols in wireless local area networks and study the tradeoffs between the security strengths of these protocols and the amount of energy consumed. For the analysis, we use distributions of packet sizes based on packets collected in home and campus wireless local area networks and measurements of the number of CPU cycles taken for cryptographic computation.

[1]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[2]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[3]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[4]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[5]  Dan Harkins,et al.  The Internet Key Exchange (IKE) , 1998, RFC.

[6]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.

[7]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[8]  A. M. Murray Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications , 1999 .

[9]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.

[10]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[11]  P. Krishnamurthy,et al.  Encryption and Power Consumption in Wireless LANs , 2001 .

[12]  Krishna M. Sivalingam,et al.  A Survey of Energy Efficient Network Protocols for Wireless Networks , 2001, Wirel. Networks.

[13]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[14]  A. Sinha,et al.  JouleTrack-a Web based tool for software energy profiling , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).

[15]  Sagar Naik,et al.  Software Implementation Strategies for Power-Conscious Systems , 2001, Mob. Networks Appl..

[16]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[17]  A. Raghunathan,et al.  Battery-driven system design: a new frontier in low power design , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[18]  Jean Bacon,et al.  A model of OASIS role-based access control and its support for active security , 2002, ACM Trans. Inf. Syst. Secur..

[19]  Prashant Krishnamurthy,et al.  Analysis of energy consumption of RC4 and AES algorithms in wireless LANs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[20]  Wi-Fi Alliance,et al.  Wi-Fi protected access , 2003 .

[21]  Linda Dailey Paulson,et al.  Will Fuel Cells Replace Batteries in Mobile Devices? , 2003, Computer.

[22]  Elisa Bertino,et al.  Dependencies and separation of duty constraints in GTRBAC , 2003, SACMAT '03.

[23]  Sohail A Hirani Energy Consumption of Encryption Schemes in Wireless Devices , 2003 .

[24]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[25]  Prashant Krishnamurthy,et al.  On a framework for energy-efficient security protocols in wireless networks , 2004, Comput. Commun..