Securing wireless data: system architecture challenges

Security is critical to a wide range of current and future wireless data applications and services. This paper highlights the challenges posed by the need for security during system architecture design for wireless handsets, and provides an overview of emerging techniques to address them. We focus on the computational requirements for securing wireless data transactions, revealing a gap between these requirements and the trends in processing capabilities of embedded processors used in wireless handsets. We also demonstrate that the use of security protocols causes significant degradation in battery life, a problem that will worsen due to the slow growth in battery capacities. These trends point to a wireless security processing gap that, unless addressed, will impede the deployment of secure high-speed wireless data and multi-media applications. We discuss approaches that are currently being pursued to bridge this gap, including low-complexity cryptographic algorithms, security enhancements to embedded processors, and advanced system architectures for wireless handsets that are enabled by new system level design methodologies.

[1]  Diptikalyan Saha,et al.  Securing electronic commerce: reducing the SSL overhead , 2000 .

[2]  A. Raghunathan,et al.  Battery-driven system design: a new frontier in low power design , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[3]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[4]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[5]  Ruby B. Lee,et al.  Efficient permutation instructions for fast software cryptography , 2001 .

[6]  A. Mehrotra,et al.  Mobility and security management in the GSM system and some proposed future improvements , 1998, Proc. IEEE.

[7]  Luo Hong JAVA Security Architecture , 2000 .

[8]  Ganesh Lakshminarayana,et al.  Algorithm Exploration for Efficient Public-Key Security Processing on Wireless Handsets , 2002 .

[9]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[10]  Ruby B. Lee Subword parallelism with MAX-2 , 1996, IEEE Micro.

[11]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .

[12]  Paul Ashley,et al.  Wired versus wireless security: the Internet, WAP and iMode for E-commerce , 2001, Seventeenth Annual Computer Security Applications Conference.

[13]  Lynn Andrea Stein,et al.  The world wide web security faq , 2002 .

[14]  Sandra Kay Miller Facing the Challenge of Wireless Security , 2001, Computer.

[15]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[16]  Sunil Hattangady,et al.  Reducing the Security Threats to 2.5G and 3G Wireless Applications , 2002 .

[17]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[18]  George Lawton Biometrics: A new era in security , 1998, Computer.

[19]  C. Brookson GSM security: a description of the reasons for security and the techniques , 1994 .

[20]  Ira Krepchin,et al.  Texas Instruments Inc. , 1963, Nature.

[21]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of multimedia , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[22]  Jesse Walker,et al.  Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .

[23]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..

[24]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[25]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[26]  T. Austin,et al.  Architectural support for fast symmetric-key cryptography , 2000, ASPLOS IX.

[27]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[28]  Dan Boneh,et al.  Experimenting with Electronic Commerce on the PalmPilot , 1999, Financial Cryptography.

[29]  Wu-chi Feng,et al.  Lightweight security mechanisms for wireless video transmission , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[30]  Hugo Krawczyk,et al.  Security issues in a CDPD wireless network , 1995, IEEE Wirel. Commun..

[31]  Sarvar Patel,et al.  Weaknesses of North American wireless authentication protocol , 1997, IEEE Wirel. Commun..

[32]  Vipul Gupta,et al.  Experiments in wireless Internet security , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).

[33]  Srivaths Ravi,et al.  System design methodologies for a wireless security processing platform , 2002, DAC '02.

[34]  Richard J. Lipton,et al.  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.

[35]  Srivaths Ravi,et al.  Optimizing public-key encryption for wireless clients , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).