Battery power-aware encryption

Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between power consumption and security, and (c) formulate and solve security maximization subject to power constraints. Numerical results are presented to illustrate the gains that can be achieved in using solutions of the proposed security maximization problems subject to power constraints.

[1]  Anand Raghunathan,et al.  Securing wireless data: system architecture challenges , 2002, 15th International Symposium on System Synthesis, 2002..

[2]  Elaine B. Barker,et al.  Status Report on the First Round of the Development of the Advanced Encryption Standard , 1999, Journal of Research of the National Institute of Standards and Technology.

[3]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[4]  Ramesh Karri,et al.  Optimizing the Energy Consumed by Secure Wireless Sessions – Wireless Transport Layer Security Case Study , 2003, Mob. Networks Appl..

[5]  Anantha Chandrakasan,et al.  Design and implementation of a scalable encryption processor with embedded variable DC/DC converter , 1999, DAC '99.

[6]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[7]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[8]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[9]  Xuejia Lai,et al.  On the design and security of block ciphers , 1992 .

[10]  Nicolas Sklavos,et al.  Asynchronous low power VLSI implementation of the International Data Encryption Algorithm , 2001, ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and Systems (Cat. No.01EX483).

[11]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[12]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[13]  Ronald L. Rivest,et al.  The RC4 encryption algorithm , 1992 .

[14]  Anantha Chandrakasan,et al.  Low power scalable encryption for wireless systems , 1998, Wirel. Networks.

[15]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[16]  Rajarathnam Chandramouli,et al.  Battery power optimized encryption , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[17]  Ingrid Verbauwhede,et al.  The energy cost of secrets in ad-hoc networks , 2002 .

[18]  Ramesh Karri,et al.  MINIMIZING THE SECURE WIRELESS SESSION ENERGY , 2001 .

[19]  Ravi Sandhu,et al.  ACM Transactions on Information and System Security: Editorial , 2005 .

[20]  G. Dantzig Discrete-Variable Extremum Problems , 1957 .

[21]  Kannan Srinivasan,et al.  State based key hop protocol: a lightweight security protocol for wireless networks , 2004, PE-WASUN '04.

[22]  Liam Keliher,et al.  Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES , 2004, AES Conference.

[23]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[24]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[25]  Mitsuru Matsui,et al.  The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.

[26]  Alex Biryukov,et al.  The Boomerang Attack on 5 and 6-Round Reduced AES , 2004, AES Conference.

[27]  Prashant Krishnamurthy,et al.  Analysis of energy consumption of RC4 and AES algorithms in wireless LANs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[28]  Wu-chi Feng,et al.  Lightweight security mechanisms for wireless video transmission , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[29]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[30]  S. W. Stratton,et al.  The National Bureau of Standards , 1905, Transactions of the American Institute of Electrical Engineers.