Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sensitive to channel error as well. Therefore, security for data transmission over wireless channel results in throughput loss. Tradeoff between security and throughput is always a major concern in wireless networks. In this paper, a Link Adaptive Encryption scheme is evaluated that adapts to channel variations and enhances the security level of WLANs without making any compromise with the network performance. Numerical results obtained through simulation for link adaptive encryption scheme are compared with the fixed block length encryption technique operating in Cipher Block Chaining (CBC) mode of operation. Optimal block length is also computed, which is assumed to be the effective strength of the cipher. It has been observed that security attained with link adaptive scheme operating in CBC mode is a better solution for security and throughput tradeoff.

[1]  Seymour Stein,et al.  Fading Channel Issues in System Engineering , 1987, IEEE J. Sel. Areas Commun..

[2]  Elaine B. Barker,et al.  Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , 2004 .

[3]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[4]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[5]  Jian Sun,et al.  A novel throughput optimization approach in wireless systems , 2010, 2010 IEEE 12th International Conference on Communication Technology.

[6]  Morris J. Dworkin,et al.  SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[7]  David G. Messerschmitt,et al.  The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks , 2001, MMNS.

[8]  Rajarathnam Chandramouli,et al.  Robust encryption for secure image transmission over wireless channels , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[9]  Nilufar Baghaei,et al.  IEEE 802.11 wireless LAN security performance using multiple clients , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[10]  D. McGrew,et al.  The Galois/Counter Mode of Operation (GCM) , 2005 .

[11]  Rajarathnam Chandramouli,et al.  On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries , 2006, ACNS.

[12]  Rajarathnam Chandramouli,et al.  Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[13]  William C. Barker,et al.  TECHNOLOGY ADMINISTRATION , 2004 .

[14]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[15]  A. Goldsmith,et al.  Variable-rate variable-power MQAM for fading channels , 1996, Proceedings of Vehicular Technology Conference - VTC.

[16]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[17]  Mohammed Boulmalf,et al.  On the Impact of Security on the Performance of WLANs , 2007, J. Commun..